Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6p3m-xxpg-qhgw

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the pdg2.dll ActiveX control in SSReader 4.0 and earlier allow remote attackers to execute arbitrary code via a long argument to the Register method. NOTE: some details were obtained from third party sources.

Stack-based buffer overflow in the pdg2.dll ActiveX control in SSReader 4.0 and earlier allow remote attackers to execute arbitrary code via a long argument to the Register method. NOTE: some details were obtained from third party sources.

EPSS

Процентиль: 92%
0.09154
Низкий

Дефекты

CWE-119

Связанные уязвимости

nvd
больше 18 лет назад

Stack-based buffer overflow in the pdg2.dll ActiveX control in SSReader 4.0 and earlier allow remote attackers to execute arbitrary code via a long argument to the Register method. NOTE: some details were obtained from third party sources.

EPSS

Процентиль: 92%
0.09154
Низкий

Дефекты

CWE-119