2 results (0.003 seconds)

CVSS: 9.8EPSS: 43%CPEs: 3EXPL: 2

05 Aug 2011 — Stack-based buffer overflow in the (1) put_dir function in mongoose.c in Mongoose 3.0, (2) put_dir function in yasslEWS.c in yaSSL Embedded Web Server (yasslEWS) 0.2, and (3) _shttpd_put_dir function in io_dir.c in Simple HTTPD (shttpd) 1.42 allows remote attackers to execute arbitrary code via an HTTP PUT request, as exploited in the wild in 2011. Desbordamiento de buffer de pila en (1) la función put_dir de mongoose.c de Mongoose 3.0, (2) la función put_dir de yasslEWS.c de yaSSL Embedded Web Server (yass... • https://www.exploit-db.com/exploits/17658 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.1EPSS: 9%CPEs: 3EXPL: 4

17 Dec 2007 — Sergey Lyubka Simple HTTPD (shttpd) 1.38 and earlier on Windows allows remote attackers to download arbitrary CGI programs or scripts via a URI with an appended (1) '+' character, (2) '.' character, (3) %2e sequence (hex-encoded dot), or (4) hex-encoded character greater than 0x7f. NOTE: the %20 vector is already covered by CVE-2007-3407. Sergey Lyubka Simple HTTPD (shttpd) 1.38 y versiones anteriores en Windows permite a atacantes remotos descargar programas CGI ó scripts de su elección mediante un URI con... • https://www.exploit-db.com/exploits/4700 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •