Pico Server : Security Vulnerabilities, CVEs,
Heap-based buffer overflow in the CGI extension for Pico Server (pServ) 3.3 allows remote attackers to execute arbitrary code via a long HTTP request.
Max CVSS
7.5
EPSS Score
3.81%
Published
2005-06-11
Updated
2016-10-18
Directory traversal vulnerability in Pico Server (pServ) 3.3 allows remote attackers to read arbitrary files and execute arbitrary commands via a /./ (slash dot slash) before each .. (dot dot) sequence in the URL, which results in an incorrect directory depth count.
Max CVSS
7.5
EPSS Score
0.50%
Published
2005-06-16
Updated
2016-10-18
Pico Server (pServ) 3.2 and earlier allows local users to read arbitrary files as the pServ user via a symlink to a file outside of the web document root.
Max CVSS
7.5
EPSS Score
0.37%
Published
2005-05-16
Updated
2016-10-18
Pico Server (pServ) 3.2 and earlier allows remote attackers to obtain the source code for CGI scripts via "dirname/../cgi-bin" in a URL.
Max CVSS
7.5
EPSS Score
5.60%
Published
2005-05-16
Updated
2016-10-18
Pico Server (pServ) 3.2 and earlier allows remote attackers to execute arbitrary commands via a URL with multiple leading "/" (slash) characters and ".." sequences.
Max CVSS
10.0
EPSS Score
1.82%
Published
2005-05-16
Updated
2016-10-18
Buffer overflow in Pico Server (pServ) 2.0 beta 1 through beta 5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) a 1024-byte TCP stream message, which triggers an off-by-one buffer overflow, or (2) a long method name in an HTTP request, (3) a long version number in an HTTP request, (4) a long User-Agent header, or (5) a long file path.
Max CVSS
7.5
EPSS Score
21.87%
Published
2002-12-31
Updated
2017-07-29
6 vulnerabilities found