Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8qrp-vpc4-vphf

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in BulletProof FTP Client 2.63 and 2010 allows user-assisted attackers to execute arbitrary code via a bookmark file entry with a long host name, which appears as a host parameter within the quick-connect bar.

Stack-based buffer overflow in BulletProof FTP Client 2.63 and 2010 allows user-assisted attackers to execute arbitrary code via a bookmark file entry with a long host name, which appears as a host parameter within the quick-connect bar.

EPSS

Процентиль: 96%
0.27784
Средний

Дефекты

CWE-119

Связанные уязвимости

nvd
около 17 лет назад

Stack-based buffer overflow in BulletProof FTP Client 2.63 and 2010 allows user-assisted attackers to execute arbitrary code via a bookmark file entry with a long host name, which appears as a host parameter within the quick-connect bar.

EPSS

Процентиль: 96%
0.27784
Средний

Дефекты

CWE-119