Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2004-0456


Stack-based buffer overflow in pavuk 0.9pl28, 0.9pl27, and possibly other versions allows remote web sites to execute arbitrary code via a long HTTP Location header.


Published

2004-12-06T05:00:00.000

Last Modified

2025-04-03T01:03:51.193

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.6 (HIGH)

CVSSv2 Vector

AV:N/AC:H/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: HIGH
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

4.9

Impact Score

10.0

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application pavuk pavuk 0.9pl28i Yes
Application pavuk pavuk 0.928r1 Yes
Operating System debian debian_linux 3.0 Yes
Operating System debian debian_linux 3.0 Yes
Operating System debian debian_linux 3.0 Yes
Operating System debian debian_linux 3.0 Yes
Operating System debian debian_linux 3.0 Yes
Operating System debian debian_linux 3.0 Yes
Operating System debian debian_linux 3.0 Yes
Operating System debian debian_linux 3.0 Yes
Operating System debian debian_linux 3.0 Yes
Operating System debian debian_linux 3.0 Yes
Operating System debian debian_linux 3.0 Yes
Operating System debian debian_linux 3.0 Yes
Operating System gentoo linux 1.1a Yes
Operating System gentoo linux 1.2 Yes
Operating System gentoo linux 1.4 Yes
Operating System gentoo linux 1.4 Yes
Operating System gentoo linux 1.4 Yes
Operating System gentoo linux 1.4 Yes

References