Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
goahead goahead webserver 2.0 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2003-1569
GoAhead WebServer prior to 2.1.5 on Windows 95, 98, and ME allows remote malicious users to cause a denial of service (daemon crash) via an HTTP request with a (1) con, (2) nul, (3) clock$, or (4) config$ device name in a path component, different vectors than CVE-2001-0385.
Goahead Goahead Webserver
Goahead Goahead Webserver 2.0
Goahead Goahead Webserver 2.1
Goahead Goahead Webserver 2.1.1
Goahead Goahead Webserver 2.1.2
Goahead Goahead Webserver 2.1.3
7.5
CVSSv2
CVE-2002-2431
Unspecified vulnerability in GoAhead WebServer prior to 2.1.4 allows remote malicious users to cause "incorrect behavior" via unknown "malicious code," related to incorrect use of the socketInputBuffered function by sockGen.c.
Goahead Goahead Webserver 2.0
Goahead Goahead Webserver 2.1.2
Goahead Goahead Webserver 2.1.1
Goahead Goahead Webserver 2.1
Goahead Goahead Webserver
5
CVSSv2
CVE-2002-2429
webs.c in GoAhead WebServer prior to 2.1.4 allows remote malicious users to cause a denial of service (daemon crash) via an HTTP POST request that contains a negative integer in the Content-Length header.
Goahead Goahead Webserver 2.0
Goahead Goahead Webserver 2.1.2
Goahead Goahead Webserver 2.1.1
Goahead Goahead Webserver 2.1
Goahead Goahead Webserver
5
CVSSv2
CVE-2002-2428
webs.c in GoAhead WebServer prior to 2.1.4 allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) via an HTTP POST request that contains a Content-Length header but no body data.
Goahead Goahead Webserver 2.0
Goahead Goahead Webserver 2.1.2
Goahead Goahead Webserver 2.1.1
Goahead Goahead Webserver 2.1
Goahead Goahead Webserver
5
CVSSv2
CVE-2003-1568
GoAhead WebServer prior to 2.1.6 allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) via an invalid URL, related to the websSafeUrl function.
Goahead Goahead Webserver 2.0
Goahead Goahead Webserver 2.1.2
Goahead Goahead Webserver 2.1.1
Goahead Goahead Webserver 2.1
Goahead Software Goahead Webserver
Goahead Software Goahead Webserver 2.1.4
Goahead Software Goahead Webserver 2.1.3
5
CVSSv2
CVE-2002-2427
The security handler in GoAhead WebServer prior to 2.1.1 allows remote malicious users to bypass authentication and obtain access to protected web content via "an extra slash in a URL," a different vulnerability than CVE-2002-1603.
Goahead Goahead Webserver 2.0
Goahead Goahead Webserver
5
CVSSv2
CVE-2002-2430
GoAhead WebServer prior to 2.1.1 allows remote malicious users to cause a denial of service (CPU consumption) by performing a socket disconnect to terminate a request before it has been fully processed by the server.
Goahead Goahead Webserver 2.0
Goahead Goahead Webserver
5
CVSSv2
CVE-2002-1603
GoAhead Web Server 2.1.7 and previous versions allows remote malicious users to obtain the source code of ASP files via a URL terminated with a /, \, %2f (encoded /), %20 (encoded space), or %00 (encoded null) character, which returns the ASP source code unparsed.
Goahead Software Goahead Webserver 2.1.1
Goahead Software Goahead Webserver 2.0
Goahead Software Goahead Webserver 2.1.5
Goahead Software Goahead Webserver 2.1.2
Goahead Software Goahead Webserver 2.1.4
Goahead Software Goahead Webserver 2.1.7
Goahead Software Goahead Webserver 2.1
Goahead Software Goahead Webserver 2.1.3
Goahead Software Goahead Webserver 2.1.6
1 EDB exploit
5
CVSSv2
CVE-2001-0228
Directory traversal vulnerability in GoAhead web server 2.1 and previous versions allows remote malicious users to read arbitrary files via a .. attack in an HTTP GET request.
Goahead Software Goahead Webserver V.2.0
Goahead Software Goahead Webserver V.2.1
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37884
CVE-2024-6003
remote
brute force
information disclosure
CVE-2024-27801
CVE-2024-30078
CVE-2024-31870
CVE-2024-6042
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started