Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-55763

Опубликовано: 29 авг. 2025
Источник: debian
EPSS Низкий

Описание

Buffer Overflow in the URI parser of CivetWeb 1.14 through 1.16 (latest) allows a remote attacker to achieve remote code execution via a crafted HTTP request. This vulnerability is triggered during request processing and may allow an attacker to corrupt heap memory, potentially leading to denial of service or arbitrary code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
civetwebfixed1.16+dfsg-3package
civetwebno-dsatrixiepackage
civetwebno-dsabookwormpackage
civetwebpostponedbullseyepackage

Примечания

  • https://github.com/krispybyte/CVE-2025-55763

  • https://github.com/civetweb/civetweb/pull/1347

  • https://github.com/civetweb/civetweb/issues/1348

  • Fixed by: https://github.com/civetweb/civetweb/commit/76e222bcb77ba8452e5da4e82ae6cecd499c25e0

  • Fixed by: https://github.com/civetweb/civetweb/commit/d5321963b1d0bc953101de91f8588bf83db73bf5

EPSS

Процентиль: 88%
0.03839
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
3 месяца назад

Buffer Overflow in the URI parser of CivetWeb 1.14 through 1.16 (latest) allows a remote attacker to achieve remote code execution via a crafted HTTP request. This vulnerability is triggered during request processing and may allow an attacker to corrupt heap memory, potentially leading to denial of service or arbitrary code execution.

CVSS3: 7.5
nvd
3 месяца назад

Buffer Overflow in the URI parser of CivetWeb 1.14 through 1.16 (latest) allows a remote attacker to achieve remote code execution via a crafted HTTP request. This vulnerability is triggered during request processing and may allow an attacker to corrupt heap memory, potentially leading to denial of service or arbitrary code execution.

CVSS3: 7.5
github
3 месяца назад

Buffer Overflow in the URI parser of CivetWeb 1.14 through 1.16 (latest) allows a remote attacker to achieve remote code execution via a crafted HTTP request. This vulnerability is triggered during request processing and may allow an attacker to corrupt heap memory, potentially leading to denial of service or arbitrary code execution.

EPSS

Процентиль: 88%
0.03839
Низкий