Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h8w6-2w9h-h7rw

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple stack-based buffer overflows in (1) the encode_mime function, (2) the encode_uuencode function, (3) or the decode_uuencode function for emil 2.1.0 and earlier allow remote attackers to execute arbitrary code via e-mail messages containing attachments with filenames.

Multiple stack-based buffer overflows in (1) the encode_mime function, (2) the encode_uuencode function, (3) or the decode_uuencode function for emil 2.1.0 and earlier allow remote attackers to execute arbitrary code via e-mail messages containing attachments with filenames.

EPSS

Процентиль: 87%
0.03422
Низкий

Связанные уязвимости

ubuntu
около 21 года назад

Multiple stack-based buffer overflows in (1) the encode_mime function, (2) the encode_uuencode function, (3) or the decode_uuencode function for emil 2.1.0 and earlier allow remote attackers to execute arbitrary code via e-mail messages containing attachments with filenames.

nvd
около 21 года назад

Multiple stack-based buffer overflows in (1) the encode_mime function, (2) the encode_uuencode function, (3) or the decode_uuencode function for emil 2.1.0 and earlier allow remote attackers to execute arbitrary code via e-mail messages containing attachments with filenames.

debian
около 21 года назад

Multiple stack-based buffer overflows in (1) the encode_mime function, ...

EPSS

Процентиль: 87%
0.03422
Низкий