Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-83xj-wgx6-qphf

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the RequestScreenOptimization function in the XProcessControl.ocx ActiveX control in msls31.dll in Samsung NET-i viewer 1.37 allows remote attackers to execute arbitrary code via a long string in the first argument.

Stack-based buffer overflow in the RequestScreenOptimization function in the XProcessControl.ocx ActiveX control in msls31.dll in Samsung NET-i viewer 1.37 allows remote attackers to execute arbitrary code via a long string in the first argument.

EPSS

Процентиль: 97%
0.34713
Средний

Дефекты

CWE-119

Связанные уязвимости

nvd
больше 13 лет назад

Stack-based buffer overflow in the RequestScreenOptimization function in the XProcessControl.ocx ActiveX control in msls31.dll in Samsung NET-i viewer 1.37 allows remote attackers to execute arbitrary code via a long string in the first argument.

EPSS

Процентиль: 97%
0.34713
Средний

Дефекты

CWE-119