httpdx version 1.5.2 suffers from a remote pre-authentication denial of service vulnerability.
41226da7466282b63b909409592ecba19580963814ca6cb727f47e17052744ee
httpdx versions 1.5.4 and below suffer from a heap overflow vulnerability.
418b2d4fcc760866c7a677f04fa2344dd4f3cb2e1e8f863757935f0943065894
Secunia Security Advisory - Two vulnerabilities have been discovered in httpdx, which can be exploited by malicious people to cause a DoS (Denial of Service) and by malicious users to potentially compromise a vulnerable system.
521ca46903533ccd6bcfa1c5a0b354d4be4a85dd33510ad3535f6f7d8cd47c5b
Httpdx version 1.5.4 suffers from a denial of service vulnerability.
c50cbe6ab8e481d9566cbb0cc8fc9fc3d5e297d5737b205731166875e8d04795
Httpdx version 1.5.3 remote break services exploit.
32968f7dc02927e349c1466e3ab9694b6336ddbdf1ebd2f89594bb1ff7e3d448
httpdx version 1.5.3b remote pre-authentication denial of service proof of concept exploit.
585d744956b19dde8b38791dfcca4761b2b16c8555c7a44ae6ce69bd4ae46dc5
Secunia Security Advisory - Some vulnerabilities have been discovered in httpdx, which can be exploited by malicious people to cause a DoS (Denial of Service).
28ec32a8aa16f1d9c1f6d4de131988a69d88059690efff41520cc8d8bb4da01f
Httpdx version 1.5.3 remote break services exploit.
b8808a28a386f0d8c3d59aba63de1cbb3609069df25b542a052e8ac8dd7877b7
httpdx version 1.53b remote denial of service exploit.
087a769e8904bc84273507414999b8449b65fc18260ded7525b7f5e50ecd71b6
Secunia Security Advisory - Fb1h2s has discovered a vulnerability in httpdx, which can be exploited by malicious users to bypass certain security restrictions.
b35ee775b8a8c11bd451a9875627ba8f100e3f019409c59702efe87d9fe1c3d4
Httpdx version 1.5 suffers from a directory traversal vulnerability.
f7f8255e2a5178282a6b3948576560ca649483e471c96c5e8c86debd4d932652
Secunia Security Advisory - A vulnerability has been discovered in httpdx, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
4e406de2978c80e6edb83da36ed088580524beda59529b3a57be5da95d8afe81
Httpdx version 1.5 suffers from a remote source disclosure. This is the same vulnerability that also affected 1.4.6b.
fbcbab79b6b5e53bfdf3db2e48bf17dc42b44374d2c4f753e50a7fc9ef3a1f48
This Metasploit module exploits a format string vulnerability in HTTPDX FTP server. By sending an specially crafted FTP command containing format specifiers, an attacker can corrupt memory and execute arbitrary code. By default logging is off for HTTP, but enabled for the 'moderator' user via FTP.
931d50dd9d1e55c8f607f4660c7aa3557cc6af19452ebf2580cf70d48421a3ee
This Metasploit module exploits a format string vulnerability in HTTPDX HTTP server. By sending an specially crafted HTTP request containing format specifiers, an attacker can corrupt memory and execute arbitrary code. By default logging is off for HTTP, but enabled for the 'moderator' user via FTP.
5e82425ca633c611eb005775846af3b61ea0104b3a119879e7ff8046db79d936
Secunia Security Advisory - Dr_IDE has discovered a vulnerability in httpdx, which can be exploited by malicious people to disclose potentially sensitive information.
1e937561d55ed62ccebc3f66a4a3b44196311112f5e0f94709264457781bb67d
httpdx versions 1.4.6b and below suffer from a remote source disclosure vulnerability.
98948223e12a8b84516376da40c85bb4c592ef504d15246adc5aed6c11864096
This Metasploit module exploits a stack-based buffer overflow vulnerability in HTTPDX HTTP server 1.4. The vulnerability is caused due to a boundary error within the "h_handlepeer()" function in http.cpp. By sending an overly long HTTP request, an attacker can overrun a buffer and execute arbitrary code.
96eaa8c48e19f5fb3dca4fdb11170227a1757203bb4e06504fea12b4f61860cd
Secunia Security Advisory - Dr_IDE has discovered a vulnerability in httpdx, which can be exploited by malicious people to disclose potentially sensitive information.
bd0e2d8dd8d13ceff92ed9915bf2b7e7a2e9388b5d7d208c950c469aa1ca3aa7
httpdx versions 1.4.4 and below suffer from a remote source disclosure vulnerability.
d534f4b30f574c562fa9ed0edea96cb9b7807bfdc9994df7539e31609e5b333f
Secunia Security Advisory - Pankaj Kohli has discovered a vulnerability in httpdx, which can be exploited by malicious people to compromise a vulnerable system.
cb6581e9ba7b7e28ec04349b6773d4df66956997f3e538c0b9ce20eebfaeb2c9
httpdx web server version 1.4 if vulnerable to a remote buffer overflow vulnerable when supplied a long GET request. Exploit is written for httpdx 1.4 on Windows XP SP3 and binds a shell to port 58821.
5d96dbe8f5911c612a8f12706970eff41b42e26d83533dd643d8743bbe48c779
Secunia Security Advisory - A vulnerability has been reported in httpdx Web Server, which can be exploited by malicious people to compromise a vulnerable system.
b9097e012990c9b39c7f3d7d68a616c79204ed5222ec17949a750be0619d56b2
httpdx web server version 1.4 Host Header remote format string denial of service exploit.
ad1c2ae6cf421d23d5b02795979e5414f32097f30f8f9bce200aced0f613943e
httpdx FTP server versions 0.8 and below suffer from remote arbitrary manipulation of directories and files.
a3e9a9283c20069648c8fa9aad5f3d43ff9bacc75d4b709278253ce96a4aff77
httpdx versions 0.5b and below CWD related remote buffer overflow exploit.
3a673d9784f945eec0d25868cc777143875b140033f88820c081cc2255394728