Filtered by vendor Peercast
Subscriptions
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2005-1806 | 1 Peercast | 1 Peercast | 2024-08-07 | N/A |
Format string vulnerability in PeerCast 0.1211 and earlier allows remote attackers to execute arbitrary code via format strings in the URL. | ||||
CVE-2006-1148 | 1 Peercast | 1 Peercast | 2024-08-07 | N/A |
Multiple stack-based buffer overflows in the procConnectArgs function in servmgr.cpp in PeerCast before 0.1217 allow remote attackers to execute arbitrary code via an HTTP GET request with a long (1) parameter name or (2) value in a URL, which triggers the overflow in the nextCGIarg function in servhs.cpp. | ||||
CVE-2007-6454 | 1 Peercast | 1 Peercast | 2024-08-07 | N/A |
Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long SOURCE request. | ||||
CVE-2007-3087 | 1 Peercast | 1 Peercast | 2024-08-07 | N/A |
Peercast places a cleartext password in a query string, which might allow attackers to obtain sensitive information by sniffing the network, or obtaining Referer or browser history information. | ||||
CVE-2008-2040 | 1 Peercast | 1 Peercast | 2024-08-07 | N/A |
Stack-based buffer overflow in the HTTP::getAuthUserPass function (core/common/http.cpp) in Peercast 0.1218 and gnome-peercast allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Basic Authentication string with a long (1) username or (2) password. |
Page 1 of 1.