Page 3 of 11 results (0.005 seconds)

CVSS: 7.5EPSS: 92%CPEs: 10EXPL: 1

Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests. Desbordamiento de búfer inferior en src/http/ngx_http_parse.c en nginx v0.1.0 a la v0.5.37, v0.6.x a la v0.6.39, v0.7.x a la v0.7.62, y v0.8.x anterior a v0.8.15, permite a atacantes ejecutar código de su elección a través de peticiones HTTP manipuladas. • https://www.exploit-db.com/exploits/14830 http://nginx.net/CHANGES http://nginx.net/CHANGES-0.5 http://nginx.net/CHANGES-0.6 http://nginx.net/CHANGES-0.7 http://sysoev.ru/nginx/patch.180065.txt http://www.debian.org/security/2009/dsa-1884 http://www.kb.cert.org/vuls/id/180065 https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html https://www. • CWE-787: Out-of-bounds Write •