Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c8m3-9rx4-4cq6

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the dhost module in Novell eDirectory 8.8 SP5 for Windows allows remote authenticated users to execute arbitrary code via long sadminpwd and verifypwd parameters in a submit action to /dhost/httpstk.

Stack-based buffer overflow in the dhost module in Novell eDirectory 8.8 SP5 for Windows allows remote authenticated users to execute arbitrary code via long sadminpwd and verifypwd parameters in a submit action to /dhost/httpstk.

EPSS

Процентиль: 94%
0.15487
Средний

Дефекты

CWE-119

Связанные уязвимости

nvd
почти 16 лет назад

Stack-based buffer overflow in the dhost module in Novell eDirectory 8.8 SP5 for Windows allows remote authenticated users to execute arbitrary code via long sadminpwd and verifypwd parameters in a submit action to /dhost/httpstk.

EPSS

Процентиль: 94%
0.15487
Средний

Дефекты

CWE-119