Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
rejetto http file server vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-7226
The file comment feature in Rejetto HTTP File Server (hfs) 2.3c and previous versions allows remote malicious users to execute arbitrary code by uploading a file with certain invalid UTF-8 byte sequences that are interpreted as executable macro symbols.
Rejetto Http File Server
1 EDB exploit
9.8
CVSSv3
CVE-2014-6287
The findMacroMarker function in parserLib.pas in Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x prior to 2.3c allows remote malicious users to execute arbitrary programs via a %00 sequence in a search action.
Rejetto Http File Server
3 EDB exploits
14 Github repositories
7.5
CVSSv3
CVE-2020-13432
rejetto HFS (aka HTTP File Server) v2.3m Build #300, when virtual files or folders are used, allows remote malicious users to trigger an invalid-pointer write access violation via concurrent HTTP requests with a long URI or long HTTP headers.
Rejetto Http File Server 2.3m
NA
CVE-2008-0406
HTTP File Server (HFS) prior to 2.2c, when account names are used as log filenames, allows remote malicious users to cause a denial of service (daemon crash) via a long account name.
Hfs Http File Server
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started