Product:

Uc\-Http

(Weston\-Embedded)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 6
Date Id Summary Products Score Patch Annotated
2023-11-14 CVE-2023-25181 A heap-based buffer overflow vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted set of network packets can lead to arbitrary code execution. An attacker can send a malicious packet to trigger this vulnerability. Gecko_software_development_kit, Cesium_net, Uc\-Http 9.8
2023-11-14 CVE-2023-27882 A heap-based buffer overflow vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability. Gecko_software_development_kit, Cesium_net, Uc\-Http 9.8
2023-11-14 CVE-2023-28379 A memory corruption vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability. Gecko_software_development_kit, Cesium_net, Uc\-Http 9.8
2023-11-14 CVE-2023-24585 An out-of-bounds write vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to memory corruption. An attacker can send a network request to trigger this vulnerability. Gecko_software_development_kit, Cesium_net, Uc\-Http 9.8
2023-11-14 CVE-2023-28391 A memory corruption vulnerability exists in the HTTP Server header parsing functionality of Weston Embedded uC-HTTP v3.01.01. Specially crafted network packets can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability. Gecko_software_development_kit, Cesium_net, Uc\-Http 9.8
2023-11-14 CVE-2023-31247 A memory corruption vulnerability exists in the HTTP Server Host header parsing functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability. Gecko_software_development_kit, Cesium_net, Uc\-Http 9.8