Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9qxv-mv47-gw7g

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815.

Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815.

EPSS

Процентиль: 94%
0.14379
Средний

Связанные уязвимости

ubuntu
почти 19 лет назад

Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815.

nvd
почти 19 лет назад

Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815.

debian
почти 19 лет назад

Buffer overflow in the tls_x509_name_oneline function in the mod_tls m ...

fstec
около 19 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 94%
0.14379
Средний