Critical severityNVD Advisory· Published Aug 8, 2025· Updated Apr 15, 2026
CVE-2012-10053
CVE-2012-10053
Description
Simple Web Server 2.2 rc2 contains a stack-based buffer overflow vulnerability in its handling of the Connection HTTP header. When a remote attacker sends an overly long string in this header, the server uses vsprintf() without proper bounds checking, leading to a buffer overflow on the stack. This flaw allows remote attackers to execute arbitrary code with the privileges of the web server process. The vulnerability is triggered before authentication.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- ghostinthelab.wordpress.com/2012/07/19/simplewebserver-2-2-rc2-remote-buffer-overflow-exploit/nvd
- www.pmx.it/software/sws.aspnvd
- raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/sws_connection_bof.rbnvd
- www.exploit-db.com/exploits/19937nvd
- www.exploit-db.com/exploits/20028nvd
- www.vulncheck.com/advisories/simple-web-server-connection-header-buffer-overflownvd
News mentions
0No linked articles in our index yet.