Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j7f4-8wcx-2rx9

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in (1) sastcpd in SAS/Base 8.0 and 8.1 or (2) objspawn in SAS/Integration Technologies 8.0 and 8.1 allows local users to execute arbitrary code via large command line argument.

Buffer overflow in (1) sastcpd in SAS/Base 8.0 and 8.1 or (2) objspawn in SAS/Integration Technologies 8.0 and 8.1 allows local users to execute arbitrary code via large command line argument.

EPSS

Процентиль: 36%
0.00149
Низкий

Связанные уязвимости

nvd
больше 23 лет назад

Buffer overflow in (1) sastcpd in SAS/Base 8.0 and 8.1 or (2) objspawn in SAS/Integration Technologies 8.0 and 8.1 allows local users to execute arbitrary code via large command line argument.

EPSS

Процентиль: 36%
0.00149
Низкий