Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h2jh-2gpr-chh9

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the agent in Persistent Accelerite Radia Client Automation (formerly HP Client Automation), possibly before 9.1, allows remote attackers to execute arbitrary code by sending a large amount of data in an environment that lacks relationship-based firewalling.

Stack-based buffer overflow in the agent in Persistent Accelerite Radia Client Automation (formerly HP Client Automation), possibly before 9.1, allows remote attackers to execute arbitrary code by sending a large amount of data in an environment that lacks relationship-based firewalling.

EPSS

Процентиль: 95%
0.15734
Средний

Дефекты

CWE-119

Связанные уязвимости

nvd
больше 10 лет назад

Stack-based buffer overflow in the agent in Persistent Accelerite Radia Client Automation (formerly HP Client Automation), possibly before 9.1, allows remote attackers to execute arbitrary code by sending a large amount of data in an environment that lacks relationship-based firewalling.

fstec
больше 10 лет назад

Уязвимость программы автоматизации работы пользователей Radia Client Automation, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 95%
0.15734
Средний

Дефекты

CWE-119