Buffer overflow in WiTango Application Server and Tango 2000 allows remote attackers to execute arbitrary code via a long cookie to Witango_UserReference.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0038.html | Broken Link Exploit Vendor Advisory |
http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0038.html | Broken Link Exploit Vendor Advisory |
Configurations
History
20 Nov 2024, 23:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0038.html - Broken Link, Exploit, Vendor Advisory |
09 Feb 2024, 03:18
Type | Values Removed | Values Added |
---|---|---|
References | (VULNWATCH) http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0038.html - Broken Link, Exploit, Vendor Advisory | |
CPE | cpe:2.3:a:witango:tango_server:2000:*:*:*:*:*:*:* |
cpe:2.3:a:terascript:wintango_application_server:*:*:*:*:*:*:*:* |
CWE | CWE-120 | |
First Time |
Terascript wintango Application Server
Terascript |
Information
Published : 2003-08-27 04:00
Updated : 2024-11-20 23:45
NVD link : CVE-2003-0595
Mitre link : CVE-2003-0595
CVE.ORG link : CVE-2003-0595
JSON object : View
Products Affected
terascript
- wintango_application_server
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')