Page 3 of 12 results (0.007 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

In Puma before versions 3.12.2 and 4.3.1, a poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough. This vulnerability is patched in Puma 4.3.1 and 3.12.2. En Puma, anterior a las versiones 3.12.2 y 4.3.1, un cliente con mal comportamiento podría utilizar solicitudes de keepalive para monopolizar el reactor de Puma y crear un ataque de denegación de servicio. Si se abren más conexiones keepalive a Puma que hilos disponibles, las conexiones adicionales esperarán permanentemente si el atacante envía solicitudes con la suficiente frecuencia. • https://github.com/puma/puma/security/advisories/GHSA-7xx3-m584-x994 https://lists.debian.org/debian-lts-announce/2022/05/msg00034.html • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 7.5EPSS: 16%CPEs: 1EXPL: 2

PHP remote file inclusion vulnerability in config.php in PSYWERKS PUMA 1.0 RC2 allows remote attackers to execute arbitrary PHP code via a URL in the fpath parameter. Vulnerabilidad PHP de inclusión remota de archivo en config.php en PSYWERKS PUMA 1.0 RC2 permite a un atacante remoto ejecutar código PHP de su elección a través de una URL en el parámetro fpath. • https://www.exploit-db.com/exploits/2340 http://securityreason.com/securityalert/1557 http://www.bb-pcsecurity.de/Websecurity/415/org/PUMA_1.0_RC_2_%28config.php%29_R%20FI.htm http://www.securityfocus.com/archive/1/445723/100/0/threaded http://www.securityfocus.com/bid/19940 http://www.vupen.com/english/advisories/2006/3545 https://exchange.xforce.ibmcloud.com/vulnerabilities/28837 •