Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3rxw-g5h2-cm9q

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in dhost.exe in Novell eDirectory 8.8 before 8.8.3, and 8.7.3 before 8.7.3.10 ftf1, allows remote attackers to execute arbitrary code via a SOAP request with a long Accept-Language header.

Heap-based buffer overflow in dhost.exe in Novell eDirectory 8.8 before 8.8.3, and 8.7.3 before 8.7.3.10 ftf1, allows remote attackers to execute arbitrary code via a SOAP request with a long Accept-Language header.

EPSS

Процентиль: 96%
0.2652
Средний

Дефекты

CWE-119

Связанные уязвимости

nvd
больше 17 лет назад

Heap-based buffer overflow in dhost.exe in Novell eDirectory 8.8 before 8.8.3, and 8.7.3 before 8.7.3.10 ftf1, allows remote attackers to execute arbitrary code via a SOAP request with a long Accept-Language header.

EPSS

Процентиль: 96%
0.2652
Средний

Дефекты

CWE-119