Yaws 1.91

CPE Details

Yaws 1.91
1.91
2019-07-25
15h07 +00:00
2019-07-25
15h07 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:yaws:yaws:1.91:*:*:*:*:*:*:*

Informations

Vendor

yaws

Product

yaws

Version

1.91

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2020-24916 2020-09-09 16h10 +00:00 CGI implementation in Yaws web server versions 1.81 to 2.0.7 is vulnerable to OS command injection.
9.8
Critical
CVE-2020-24379 2020-09-09 16h10 +00:00 WebDAV implementation in Yaws web server versions 1.81 to 2.0.7 is vulnerable to XXE injection.
9.8
Critical
CVE-2016-1000108 2019-12-10 13h58 +00:00 yaws before 2.0.4 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.
6.1
Medium
CVE-2011-4350 2019-11-26 03h49 +00:00 Yaws 1.91 has a directory traversal vulnerability in the way certain URLs are processed. A remote authenticated user could use this flaw to obtain content of arbitrary local files via specially-crafted URL request.
6.5
Medium
CVE-2017-10974 2017-07-07 09h00 +00:00 Yaws 1.91 allows Unauthenticated Remote File Disclosure via HTTP Directory Traversal with /%5C../ to port 8080. NOTE: this CVE is only about use of an initial /%5C sequence to defeat traversal protection mechanisms; the initial /%5C sequence was apparently not discussed in earlier research on this product.
7.5
High