3 results (0.011 seconds)

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

Multiple buffer overflows in Pavuk before 0.9.32 have unknown attack vectors and impact. • http://secunia.com/advisories/14571 http://sourceforge.net/project/shownotes.php?release_id=313436 •

CVSS: 7.5EPSS: 4%CPEs: 3EXPL: 2

Multiple buffer overflows in the digest authentication functionality in Pavuk 0.9.28-r2 and earlier allow remote attackers to execute arbitrary code. • https://www.exploit-db.com/exploits/380 http://www.gentoo.org/security/en/glsa/glsa-200407-19.xml http://www.securityfocus.com/bid/10797 https://exchange.xforce.ibmcloud.com/vulnerabilities/16807 •

CVSS: 7.6EPSS: 0%CPEs: 20EXPL: 0

Stack-based buffer overflow in pavuk 0.9pl28, 0.9pl27, and possibly other versions allows remote web sites to execute arbitrary code via a long HTTP Location header. Desbordamiento basado en la pila en pavuk 0.9pl28, 0.9pl27, y posiblemente otras versiones permite a sitios web remotos ejecutar código de su elección mediante una cabecera de localización HTTP larga. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023322.html http://security.gentoo.org/glsa/glsa-200406-22.xml http://www.debian.org/security/2004/dsa-527 http://www.securityfocus.com/bid/10633 https://exchange.xforce.ibmcloud.com/vulnerabilities/16551 •