Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6gj4-wp95-h55h

Опубликовано: 16 июн. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 5.1
CVSS3: 5.5

Описание

A vulnerability classified as critical was found in uYanki board-stm32f103rc-berial up to 84daed541609cb7b46854cc6672a275d1007e295. This vulnerability affects the function heartrate1_i2c_hal_write of the file 7.Example/hal/i2c/max30100/Manual/demo2/2/heartrate1_hal.c. The manipulation of the argument num leads to stack-based buffer overflow. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.

A vulnerability classified as critical was found in uYanki board-stm32f103rc-berial up to 84daed541609cb7b46854cc6672a275d1007e295. This vulnerability affects the function heartrate1_i2c_hal_write of the file 7.Example/hal/i2c/max30100/Manual/demo2/2/heartrate1_hal.c. The manipulation of the argument num leads to stack-based buffer overflow. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.

EPSS

Процентиль: 4%
0.00021
Низкий

5.1 Medium

CVSS4

5.5 Medium

CVSS3

Дефекты

CWE-119

Связанные уязвимости

CVSS3: 5.5
nvd
3 дня назад

A vulnerability classified as critical was found in uYanki board-stm32f103rc-berial up to 84daed541609cb7b46854cc6672a275d1007e295. This vulnerability affects the function heartrate1_i2c_hal_write of the file 7.Example/hal/i2c/max30100/Manual/demo2/2/heartrate1_hal.c. The manipulation of the argument num leads to stack-based buffer overflow. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.

EPSS

Процентиль: 4%
0.00021
Низкий

5.1 Medium

CVSS4

5.5 Medium

CVSS3

Дефекты

CWE-119