Vulnerabilities > Peercast
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2008-04-30 | CVE-2008-2040 | Buffer Errors vulnerability in Peercast 0.1218 Stack-based buffer overflow in the HTTP::getAuthUserPass function (core/common/http.cpp) in Peercast 0.1218 and gnome-peercast allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Basic Authentication string with a long (1) username or (2) password. | 7.5 |
2007-12-20 | CVE-2007-6454 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Peercast 0.1211/0.1212/0.1215 Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long SOURCE request. | 10.0 |
2007-06-06 | CVE-2007-3087 | Information Disclosure vulnerability in Peercast Peercast places a cleartext password in a query string, which might allow attackers to obtain sensitive information by sniffing the network, or obtaining Referer or browser history information. | 7.8 |
2006-03-10 | CVE-2006-1148 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Peercast 0.1211/0.1212 Multiple stack-based buffer overflows in the procConnectArgs function in servmgr.cpp in PeerCast before 0.1217 allow remote attackers to execute arbitrary code via an HTTP GET request with a long (1) parameter name or (2) value in a URL, which triggers the overflow in the nextCGIarg function in servhs.cpp. | 7.5 |
2005-05-28 | CVE-2005-1806 | Unspecified vulnerability in Peercast Format string vulnerability in PeerCast 0.1211 and earlier allows remote attackers to execute arbitrary code via format strings in the URL. | 7.5 |