MiniShare 1.3.2 allows remote attackers to cause a denial of service (crash) via a malformed HTTP GET or HEAD request without the proper number of trailing CRLF sequences.
References
Configurations
History
20 Nov 2024, 23:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.netsys.com/pipermail/full-disclosure/2004-May/021980.html - | |
References | () http://marc.info/?l=bugtraq&m=108563992129877&w=2 - | |
References | () http://secunia.com/advisories/11715 - Exploit, Patch, Vendor Advisory | |
References | () http://sourceforge.net/project/shownotes.php?release_id=241158 - Patch, Vendor Advisory | |
References | () http://www.autistici.org/fdonato/advisory/MiniShare1.3.2-adv.txt - Exploit, Vendor Advisory | |
References | () http://www.osvdb.org/6432 - Exploit, Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/10417 - Exploit, Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/16260 - |
Information
Published : 2004-05-26 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2004-2035
Mitre link : CVE-2004-2035
CVE.ORG link : CVE-2004-2035
JSON object : View
Products Affected
minishare
- minimal_http_server
CWE