CVE-2001-0028

Buffer overflow in the HTML parsing code in oops WWW proxy server 1.5.2 and earlier allows remote attackers to execute arbitrary commands via a large number of " (quotation) characters.
Configurations

Configuration 1 (hide)

cpe:2.3:a:igor_khasilev:oops_proxy_server:1.4.22:*:*:*:*:*:*:*

History

20 Nov 2024, 23:34

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2000-12/0127.html - Exploit, Patch, Vendor Advisory () http://archives.neohapsis.com/archives/bugtraq/2000-12/0127.html - Exploit, Patch, Vendor Advisory
References () http://archives.neohapsis.com/archives/freebsd/2000-12/0418.html - Patch, Vendor Advisory () http://archives.neohapsis.com/archives/freebsd/2000-12/0418.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/2099 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/bid/2099 - Exploit, Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/5725 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/5725 -

Information

Published : 2001-02-12 05:00

Updated : 2024-11-20 23:34


NVD link : CVE-2001-0028

Mitre link : CVE-2001-0028

CVE.ORG link : CVE-2001-0028


JSON object : View

Products Affected

igor_khasilev

  • oops_proxy_server