Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7c52-ww2j-7v63

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple stack-based buffer overflows in the phpcups PHP module for CUPS 1.1.23rc1 might allow context-dependent attackers to execute arbitrary code via vectors that result in long function parameters, as demonstrated by the cups_get_dest_options function in phpcups.c.

Multiple stack-based buffer overflows in the phpcups PHP module for CUPS 1.1.23rc1 might allow context-dependent attackers to execute arbitrary code via vectors that result in long function parameters, as demonstrated by the cups_get_dest_options function in phpcups.c.

EPSS

Процентиль: 78%
0.0114
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 19 лет назад

Multiple stack-based buffer overflows in the phpcups PHP module for CUPS 1.1.23rc1 might allow context-dependent attackers to execute arbitrary code via vectors that result in long function parameters, as demonstrated by the cups_get_dest_options function in phpcups.c.

nvd
больше 19 лет назад

Multiple stack-based buffer overflows in the phpcups PHP module for CUPS 1.1.23rc1 might allow context-dependent attackers to execute arbitrary code via vectors that result in long function parameters, as demonstrated by the cups_get_dest_options function in phpcups.c.

debian
больше 19 лет назад

Multiple stack-based buffer overflows in the phpcups PHP module for CU ...

EPSS

Процентиль: 78%
0.0114
Низкий

Дефекты

CWE-119