Page 3 of 14 results (0.019 seconds)

CVSS: 7.5EPSS: 47%CPEs: 3EXPL: 2

Stack-based buffer overflow in the (1) put_dir function in mongoose.c in Mongoose 3.0, (2) put_dir function in yasslEWS.c in yaSSL Embedded Web Server (yasslEWS) 0.2, and (3) _shttpd_put_dir function in io_dir.c in Simple HTTPD (shttpd) 1.42 allows remote attackers to execute arbitrary code via an HTTP PUT request, as exploited in the wild in 2011. Desbordamiento de buffer de pila en (1) la función put_dir de mongoose.c de Mongoose 3.0, (2) la función put_dir de yasslEWS.c de yaSSL Embedded Web Server (yasslEWS) 0.2 y (3) la función _shttpd_put_dir de io_dir.c de Simple HTTPD (shttpd) 1.42. Permite a atacantes remotos ejecutar código arbitrario a través de una petición HTTP PUT, como se ha demostrado en ataques en el 2011. • https://www.exploit-db.com/exploits/17658 https://www.exploit-db.com/exploits/17669 http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065273.html http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065505.html http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065537.html http://secunia.com/advisories/45464 http://secunia.com/advisories/45902 http://securityreason.com/securityalert/8337 http://www.openwall.com/lists/oss-security/2011/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 1

Mongoose 2.8.0 and earlier allows remote attackers to obtain the source code for a web page by appending ::$DATA to the URI. Mongoose v2.8.0 y anteriores permite a atacantes remotos obtener el código fuente de una página web añadiendo ::$DATA a la URI. • http://packetstormsecurity.org/0910-exploits/mongoose-disclose.txt http://secunia.com/advisories/36934 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 4

Mongoose 2.8.0 and earlier allows remote attackers to obtain the source code for a web page by appending a / (slash) character to the URI. Mongoose v2.8.0 y anteriores permite a atacantes remotos obtener el código fuente de una página web añadiendo un carácter / (barra) a la URI. • https://www.exploit-db.com/exploits/9897 https://www.exploit-db.com/exploits/12309 http://freetexthost.com/0lcsrgt3vw http://pocoftheday.blogspot.com/2009/10/mongoose-web-server-v280-remote-source_22.html http://secunia.com/advisories/36934 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.0EPSS: 1%CPEs: 1EXPL: 2

Directory traversal vulnerability in Mongoose 2.4 allows remote attackers to read arbitrary files via a .. (dot dot) in the URI. Vulnerabilidad de salto de directorio en Mongoose v2.4 permite a atacantes remotos leer ficheros de forma arbitraria a través de .. (punto punto) en el URI. • https://www.exploit-db.com/exploits/8428 http://www.securityfocus.com/archive/1/502648/100/0/threaded http://www.securityfocus.com/bid/34510 https://exchange.xforce.ibmcloud.com/vulnerabilities/49878 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •