🔐 CVE Alert

CVE-2010-10012

UNKNOWN 0.0

httpdASM 0.92 Path Traversal

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

A path traversal vulnerability exists in httpdasm version 0.92, a lightweight Windows HTTP server, that allows unauthenticated attackers to read arbitrary files on the host system. By sending a specially crafted GET request containing a sequence of URL-encoded backslashes and directory traversal patterns, an attacker can escape the web root and access sensitive files outside of the intended directory.

CWE CWE-22
Vendor japheth
Product httpdasm
Published Jul 23, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for japheth httpdasm

Be the first to know when new unknown vulnerabilities affecting japheth httpdasm are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Japheth / httpdasm
0.92

References

NVD ↗ CVE.org ↗ EPSS Data ↗
exploit-db.com: https://www.exploit-db.com/exploits/15861 raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/httpdasm_directory_traversal.rb japheth.de: https://www.japheth.de/httpdASM.html vulncheck.com: https://www.vulncheck.com/advisories/httpasm-path-traversal

Credits

John Leitch