CVE-2012-0273
Multiple stack-based buffer overflows in MinaliC 2.0.0 allow remote attackers to execute arbitrary code via a (1) session_id cookie in a request to the get_cookie_value function in response.c, (2) directory name in a request to the add_default_file function in response.c, or (3) file name in a request to the retrieve_physical_file_name_or_brows function in response.c.
View on NVDSeverity
N/A
EPSS
Probability of exploitation (next 30 days): 0.0427 (4.3%)
Percentile: 88.9%
EPSS: 2026-05-06
Affects
hans_alshoff:minalicTechnical description
Multiple stack-based buffer overflows in MinaliC 2.0.0 allow remote attackers to execute arbitrary code via a (1) session_id cookie in a request to the get_cookie_value function in response.c, (2) directory name in a request to the add_default_file function in response.c, or (3) file name in a request to the retrieve_physical_file_name_or_brows function in response.c.
Published: 6/20/2014, 2:55:05 PM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://secunia.com/advisories/45462
- http://secunia.com/secunia_research/2012-5
- http://www.securityfocus.com/bid/52873
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74651
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74652
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74653
- http://secunia.com/advisories/45462
- http://secunia.com/secunia_research/2012-5