Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5rhm-2fg6-w34r

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in The Palace 3.5 and earlier client allows remote attackers to execute arbitrary code via a link to a palace:// url followed by a long server address string.

Stack-based buffer overflow in The Palace 3.5 and earlier client allows remote attackers to execute arbitrary code via a link to a palace:// url followed by a long server address string.

EPSS

Процентиль: 90%
0.05704
Низкий

Связанные уязвимости

nvd
около 21 года назад

Stack-based buffer overflow in The Palace 3.5 and earlier client allows remote attackers to execute arbitrary code via a link to a palace:// url followed by a long server address string.

EPSS

Процентиль: 90%
0.05704
Низкий