Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g3f2-566v-jfqm

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer overflow in the AgentX::receive_agentx function in AgentX++ 1.4.16, as used in RealNetworks Helix Server and Helix Mobile Server 11.x through 13.x and other products, allows remote attackers to execute arbitrary code via a request with a crafted payload length.

Integer overflow in the AgentX::receive_agentx function in AgentX++ 1.4.16, as used in RealNetworks Helix Server and Helix Mobile Server 11.x through 13.x and other products, allows remote attackers to execute arbitrary code via a request with a crafted payload length.

EPSS

Процентиль: 88%
0.03626
Низкий

Связанные уязвимости

nvd
почти 16 лет назад

Integer overflow in the AgentX::receive_agentx function in AgentX++ 1.4.16, as used in RealNetworks Helix Server and Helix Mobile Server 11.x through 13.x and other products, allows remote attackers to execute arbitrary code via a request with a crafted payload length.

EPSS

Процентиль: 88%
0.03626
Низкий