Description
MiniShare 1.3.2 allows remote attackers to cause a denial of service (crash) via a malformed HTTP GET or HEAD request without the proper number of trailing CRLF sequences.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Donato Ferrante · textdoswindows
https://www.exploit-db.com/exploits/24144
References (8)
Core 8
Core References
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=108563992129877&w=2
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/10417
Various Sources mailing-list
x_refsource_fulldisc
http://lists.netsys.com/pipermail/full-disclosure/2004-May/021980.html
Exploit, Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/11715
Exploit, Vendor Advisory x_refsource_misc
http://www.autistici.org/fdonato/advisory/MiniShare1.3.2-adv.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/16260
Patch, Vendor Advisory x_refsource_confirm
http://sourceforge.net/project/shownotes.php?release_id=241158
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_osvdb
http://www.osvdb.org/6432
Scores
EPSS
0.0919
EPSS Percentile
92.7%
Details
Status
published
Products (1)
minishare/minimal_http_server
1.3.2
Published
May 26, 2004
Tracked Since
Feb 18, 2026