Vulnerabilities > SWS
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2006-11-01 | CVE-2006-5636 | Remote File Include vulnerability in Simple Website Software Common.PHP PHP remote file inclusion vulnerability in common.php in Simple Website Software (SWS) 0.99 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the SWSDIR parameter. | 5.1 |
2006-05-01 | CVE-2006-2115 | Arbitrary Code Execution vulnerability in SWS Web Server Format string vulnerability in SWS web Server 0.1.7 allows remote attackers to execute arbitrary code via unspecified vectors that are not properly handled in a syslog function call. | 7.5 |
2006-05-01 | CVE-2006-2114 | Arbitrary Code Execution vulnerability in SWS Web Server Buffer overflow in SWS web Server 0.1.7 allows remote attackers to execute arbitrary code via a long request. | 7.5 |
2002-12-31 | CVE-2002-2370 | Denial Of Service vulnerability in SWS Simple web Server 0.0.3/0.0.4/0.1.0 SWS web server 0.0.4, 0.0.3 and 0.1.0 allows remote attackers to cause a denial of service (crash) via a URL request that does not end with a newline. | 5.0 |
2002-12-31 | CVE-2002-1870 | Unspecified vulnerability in SWS Simple web Server Simple Web Server (SWS) 0.0.4 through 0.1.0 does not properly handle when the recv function call fails, which may allow remote attackers to overwrite program data or perform actions on an uninitialized heap, leading to a denial of service and possibly code execution. | 7.5 |
2002-12-31 | CVE-2002-1866 | Denial Of Service vulnerability in SWS Simple Web Server Non-existent File Request Simple Web Server (SWS) 0.0.4 through 0.1.0 does not close file descriptors for 404 error messages, which could allow remote attackers to cause a denial of service (file descriptor exhaustion) via multiple requests for pages that do not exist. | 5.0 |
2002-12-31 | CVE-2002-1864 | Unspecified vulnerability in SWS Simple web Server Directory traversal vulnerability in Simple Web Server (SWS) 0.0.4 through 0.1.0 allows remote attackers to read arbitrary files via a ".." (dot dot) in an HTTP request. | 5.0 |