Stack-based buffer overflow in put_dir function in Mongoose, yaSSL Embedded Web Server, and Simple HTTPD allows remote code execution via HTTP PUT request, exploited in 2011
Reporter | Title | Published | Views | Family All 23 |
---|---|---|---|---|
Packet Storm | Simple HTTPd 1.42 PUT Buffer Overflow | 15 Aug 201100:00 | – | packetstorm |
Prion | Stack overflow | 5 Aug 201121:55 | – | prion |
0day.today | Simple HTTPd 1.42 PUT Request Remote Buffer Overflow Vulnerability | 15 Aug 201100:00 | – | zdt |
Tenable Nessus | Fedora 14 : mongoose-3.0-2.fc14 (2011-11825) | 9 Sep 201100:00 | – | nessus |
Tenable Nessus | Fedora 15 : mongoose-3.0-2.fc15 (2011-11823) | 9 Sep 201100:00 | – | nessus |
Tenable Nessus | Fedora 16 : mongoose-3.0-2.fc16 (2011-11636) | 7 Sep 201100:00 | – | nessus |
OpenVAS | Fedora Update for mongoose FEDORA-2011-11823 | 12 Sep 201100:00 | – | openvas |
OpenVAS | Fedora Update for mongoose FEDORA-2011-11636 | 2 Apr 201200:00 | – | openvas |
OpenVAS | Fedora Update for mongoose FEDORA-2011-11825 | 12 Sep 201100:00 | – | openvas |
OpenVAS | Mongoose Web Server Remote Buffer Overflow Vulnerability | 7 Sep 201100:00 | – | openvas |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo