Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-5028

Опубликовано: 30 нояб. 2011
Источник: debian
EPSS Низкий

Описание

Stack-based buffer overflow in Namazu before 2.0.20 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted request containing an empty uri field.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
namazu2fixed2.0.20-1.0package

EPSS

Процентиль: 87%
0.03265
Низкий

Связанные уязвимости

ubuntu
около 14 лет назад

Stack-based buffer overflow in Namazu before 2.0.20 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted request containing an empty uri field.

nvd
около 14 лет назад

Stack-based buffer overflow in Namazu before 2.0.20 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted request containing an empty uri field.

github
больше 3 лет назад

Stack-based buffer overflow in Namazu before 2.0.20 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted request containing an empty uri field.

EPSS

Процентиль: 87%
0.03265
Низкий