Yaws 1.91

CPE Details

Yaws 1.91
1.91
2019-07-25
15h07 +00:00
2019-07-25
15h07 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:yaws:yaws:1.91:*:*:*:*:*:*:*

Informations

Vendor

yaws

Product

yaws

Version

1.91

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2020-24916 2020-09-09 16h10 +00:00 CGI implementation in Yaws web server versions 1.81 to 2.0.7 is vulnerable to OS command injection.
9.8
Critique
CVE-2020-24379 2020-09-09 16h10 +00:00 WebDAV implementation in Yaws web server versions 1.81 to 2.0.7 is vulnerable to XXE injection.
9.8
Critique
CVE-2016-1000108 2019-12-10 13h58 +00:00 yaws before 2.0.4 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.
6.1
Moyen
CVE-2011-4350 2019-11-26 03h49 +00:00 Yaws 1.91 has a directory traversal vulnerability in the way certain URLs are processed. A remote authenticated user could use this flaw to obtain content of arbitrary local files via specially-crafted URL request.
6.5
Moyen
CVE-2017-10974 2017-07-07 09h00 +00:00 Yaws 1.91 allows Unauthenticated Remote File Disclosure via HTTP Directory Traversal with /%5C../ to port 8080. NOTE: this CVE is only about use of an initial /%5C sequence to defeat traversal protection mechanisms; the initial /%5C sequence was apparently not discussed in earlier research on this product.
7.5
Haute