Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7672-gx6j-wr7h

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The ienipp.ocx ActiveX control in the browser plugin in Novell iPrint Client before 5.42 does not properly validate the debug parameter, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a parameter value with a crafted length, related to the ExecuteRequest method.

The ienipp.ocx ActiveX control in the browser plugin in Novell iPrint Client before 5.42 does not properly validate the debug parameter, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a parameter value with a crafted length, related to the ExecuteRequest method.

EPSS

Процентиль: 98%
0.5577
Средний

Дефекты

CWE-20

Связанные уязвимости

nvd
больше 15 лет назад

The ienipp.ocx ActiveX control in the browser plugin in Novell iPrint Client before 5.42 does not properly validate the debug parameter, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a parameter value with a crafted length, related to the ExecuteRequest method.

EPSS

Процентиль: 98%
0.5577
Средний

Дефекты

CWE-20