Логотип exploitDog
bind:CVE-2025-34096
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-34096

Количество 3

Количество 3

nvd логотип

CVE-2025-34096

7 месяцев назад

A stack-based buffer overflow vulnerability exists in Easy File Sharing HTTP Server version 7.2. The flaw is triggered when a crafted POST request is sent to the /sendemail.ghp endpoint containing an overly long Email parameter. The application fails to properly validate the length of this field, resulting in a memory corruption condition. An unauthenticated remote attacker can exploit this to execute arbitrary code with the privileges of the server process.

EPSS: Средний
github логотип

GHSA-j62r-9gm4-h7vx

7 месяцев назад

A stack-based buffer overflow vulnerability exists in Easy File Sharing HTTP Server version 7.2. The flaw is triggered when a crafted POST request is sent to the /sendemail.ghp endpoint containing an overly long Email parameter. The application fails to properly validate the length of this field, resulting in a memory corruption condition. An unauthenticated remote attacker can exploit this to execute arbitrary code with the privileges of the server process.

EPSS: Средний
fstec логотип

BDU:2025-14625

7 месяцев назад

Уязвимость веб-сервера для обмена файлами по HTTP Easy File Sharing HTTP Server, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-34096

A stack-based buffer overflow vulnerability exists in Easy File Sharing HTTP Server version 7.2. The flaw is triggered when a crafted POST request is sent to the /sendemail.ghp endpoint containing an overly long Email parameter. The application fails to properly validate the length of this field, resulting in a memory corruption condition. An unauthenticated remote attacker can exploit this to execute arbitrary code with the privileges of the server process.

49%
Средний
7 месяцев назад
github логотип
GHSA-j62r-9gm4-h7vx

A stack-based buffer overflow vulnerability exists in Easy File Sharing HTTP Server version 7.2. The flaw is triggered when a crafted POST request is sent to the /sendemail.ghp endpoint containing an overly long Email parameter. The application fails to properly validate the length of this field, resulting in a memory corruption condition. An unauthenticated remote attacker can exploit this to execute arbitrary code with the privileges of the server process.

49%
Средний
7 месяцев назад
fstec логотип
BDU:2025-14625

Уязвимость веб-сервера для обмена файлами по HTTP Easy File Sharing HTTP Server, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
49%
Средний
7 месяцев назад

Уязвимостей на страницу