Practical examples of CVE-2014-2324 and 2323
Could somebody please provide some examples on how the CVE-2014-2324 and CVE-2014-2323 could be exploited in practice.
Like could I use the URL like www.example.
(I take it this will only work with permissions for www-data)
Also how about SQL injection
I need to check a site that was running an outdated version of Lighttpd
Can you help with this problem?
Provide an answer of your own, or ask Andrew for more information if necessary.