CVE-2023-31247
- EPSS 0.37%
- Veröffentlicht 14.11.2023 10:15:28
- Zuletzt bearbeitet 04.11.2025 20:16:26
A memory corruption vulnerability exists in the HTTP Server Host header parsing functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this ...
CVE-2023-27882
- EPSS 0.33%
- Veröffentlicht 14.11.2023 10:15:27
- Zuletzt bearbeitet 04.11.2025 20:16:24
A heap-based buffer overflow vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger th...
CVE-2023-28379
- EPSS 0.28%
- Veröffentlicht 14.11.2023 10:15:27
- Zuletzt bearbeitet 04.11.2025 20:16:25
A memory corruption vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulner...
CVE-2023-28391
- EPSS 0.37%
- Veröffentlicht 14.11.2023 10:15:27
- Zuletzt bearbeitet 04.11.2025 20:16:25
A memory corruption vulnerability exists in the HTTP Server header parsing functionality of Weston Embedded uC-HTTP v3.01.01. Specially crafted network packets can lead to code execution. An attacker can send a malicious packet to trigger this vulner...
CVE-2023-24585
- EPSS 0.3%
- Veröffentlicht 14.11.2023 10:15:26
- Zuletzt bearbeitet 21.11.2024 07:48:10
An out-of-bounds write vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to memory corruption. An attacker can send a network request to trigger this vulnerability.
CVE-2023-25181
- EPSS 0.3%
- Veröffentlicht 14.11.2023 10:15:26
- Zuletzt bearbeitet 21.11.2024 07:49:15
A heap-based buffer overflow vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted set of network packets can lead to arbitrary code execution. An attacker can send a malicious packet to trigge...