Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fvjx-7cx6-588x

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.

The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.

EPSS

Процентиль: 76%
0.01003
Низкий

Связанные уязвимости

ubuntu
больше 15 лет назад

The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.

redhat
больше 15 лет назад

The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.

nvd
больше 15 лет назад

The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.

debian
больше 15 лет назад

The put command functionality in beanstalkd 1.4.5 and earlier allows r ...

EPSS

Процентиль: 76%
0.01003
Низкий