Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2qqm-m5wj-5jv5

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in pl_main.c in sail in BSDgames before 2.17-7 allows local users to execute arbitrary code via a long player name that is used in a scanf function call.

Buffer overflow in pl_main.c in sail in BSDgames before 2.17-7 allows local users to execute arbitrary code via a long player name that is used in a scanf function call.

EPSS

Процентиль: 30%
0.0015
Низкий

Связанные уязвимости

ubuntu
больше 19 лет назад

Buffer overflow in pl_main.c in sail in BSDgames before 2.17-7 allows local users to execute arbitrary code via a long player name that is used in a scanf function call.

nvd
больше 19 лет назад

Buffer overflow in pl_main.c in sail in BSDgames before 2.17-7 allows local users to execute arbitrary code via a long player name that is used in a scanf function call.

debian
больше 19 лет назад

Buffer overflow in pl_main.c in sail in BSDgames before 2.17-7 allows ...

EPSS

Процентиль: 30%
0.0015
Низкий