12 results (0.004 seconds)

CVSS: 10.0EPSS: 0%CPEs: 3EXPL: 1

Prototype Pollution in GitHub repository automattic/mongoose prior to 7.3.4. • https://github.com/automattic/mongoose/commit/305ce4ff789261df7e3f6e72363d0703e025f80d https://huntr.dev/bounties/1eef5a72-f6ab-4f61-b31d-fc66f5b4b467 • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The HTTP server in Mongoose before 7.10 accepts requests containing negative Content-Length headers. By sending a single attack payload over TCP, an attacker can cause an infinite loop in which the server continuously reparses that payload, and does not respond to any other requests. • https://blog.narfindustries.com/blog/narf-discovers-critical-vulnerabilities-in-cesanta-mongoose-http-server https://github.com/cesanta/mongoose/commit/4663090a8fb036146dfe77718cff612b0101cb0f https://github.com/cesanta/mongoose/compare/7.9...7.10 https://github.com/cesanta/mongoose/pull/2197 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

This affects the package cesanta/mongoose before 7.6. The unsafe handling of file names during upload using mg_http_upload() method may enable attackers to write files to arbitrary locations outside the designated target folder. Esto afecta al paquete cesanta/mongoose versiones anteriores a 7.6. Un manejo no seguro de los nombres de archivo durante la carga usando el método mg_http_upload() puede permitir a atacantes escribir archivos en ubicaciones arbitrarias fuera de la carpeta de destino designada • https://github.com/cesanta/mongoose/commit/c65c8fdaaa257e0487ab0aaae9e8f6b439335945 https://snyk.io/vuln/SNYK-UNMANAGED-CESANTAMONGOOSE-2404180 • CWE-552: Files or Directories Accessible to External Parties •

CVSS: 9.1EPSS: 1%CPEs: 2EXPL: 1

The mg_tls_init function in Cesanta Mongoose HTTPS server 7.0 and 6.7-6.18 (compiled with mbedTLS support) is vulnerable to remote OOB write attack via connection request after exhausting memory pool. La función mg_tls_init en el servidor Cesanta Mongoose HTTPS versión 7.0 y 6.7-6.18 (compilado con soporte mbedTLS) es vulnerable a un ataque de escritura OOB remota por medio de una petición de conexión después de agotar el grupo de memoria • https://github.com/cesanta/mongoose/issues/1203 • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 18%CPEs: 1EXPL: 0

An issue was discovered in Mongoose before 6.15. The parse_mqtt() function in mg_mqtt.c has a critical heap-based buffer overflow. Se detectó un problema en Mongoose anterior a versión 6.15. La función parse_mqtt() en el archivo mg_mqtt.c, presenta un desbordamiento de búfer en la región heap de la memoria crítico. • https://github.com/cesanta/mongoose/commit/b3e0f780c34cea88f057a62213c012aa88fe2deb https://github.com/cesanta/mongoose/releases/tag/6.15 • CWE-787: Out-of-bounds Write •