๐Ÿ” CVE Alert

CVE-2012-10053

UNKNOWN 0.0

Simple Web Server Connection Header Buffer Overflow

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Simple Web Server 2.2 rc2 contains a stack-based buffer overflow vulnerability in its handling of the Connection HTTP header. When a remote attacker sends an overly long string in this header, the server uses vsprintf() without proper bounds checking, leading to a buffer overflow on the stack. This flaw allows remote attackers to execute arbitrary code with the privileges of the web server process. The vulnerability is triggered before authentication.

CWE CWE-121
Vendor pmsoftware
Product simple web server
Published Aug 8, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for pmsoftware simple web server

Be the first to know when new unknown vulnerabilities affecting pmsoftware simple web server are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

PMSoftware / Simple Web Server
2.2 rc2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/sws_connection_bof.rb exploit-db.com: https://www.exploit-db.com/exploits/19937 exploit-db.com: https://www.exploit-db.com/exploits/20028 ghostinthelab.wordpress.com: http://ghostinthelab.wordpress.com/2012/07/19/simplewebserver-2-2-rc2-remote-buffer-overflow-exploit/ pmx.it: http://www.pmx.it/software/sws.asp vulncheck.com: https://www.vulncheck.com/advisories/simple-web-server-connection-header-buffer-overflow

Credits

mr.pr0n