Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4vv3-wjvp-xprx

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

When uploading a file in Sysax Multi Server 6.90, an authenticated user can modify the filename="" parameter in the uploadfile_name1.htm form to a length of 368 or more bytes. This will create a buffer overflow condition, causing the application to crash.

When uploading a file in Sysax Multi Server 6.90, an authenticated user can modify the filename="" parameter in the uploadfile_name1.htm form to a length of 368 or more bytes. This will create a buffer overflow condition, causing the application to crash.

EPSS

Процентиль: 74%
0.00853
Низкий

Дефекты

CWE-434

Связанные уязвимости

CVSS3: 6.5
nvd
больше 5 лет назад

When uploading a file in Sysax Multi Server 6.90, an authenticated user can modify the filename="" parameter in the uploadfile_name1.htm form to a length of 368 or more bytes. This will create a buffer overflow condition, causing the application to crash.

EPSS

Процентиль: 74%
0.00853
Низкий

Дефекты

CWE-434