Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f36r-j88j-6j27

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.

Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.

EPSS

Процентиль: 99%
0.80034
Высокий

Дефекты

CWE-787

Связанные уязвимости

ubuntu
больше 16 лет назад

Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.

redhat
больше 16 лет назад

Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.

nvd
больше 16 лет назад

Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.

debian
больше 16 лет назад

Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0 ...

EPSS

Процентиль: 99%
0.80034
Высокий

Дефекты

CWE-787