Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j7fr-q9hm-jm48

Опубликовано: 04 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple stack-based buffer overflows in MinaliC 2.0.0 allow remote attackers to execute arbitrary code via a (1) session_id cookie in a request to the get_cookie_value function in response.c, (2) directory name in a request to the add_default_file function in response.c, or (3) file name in a request to the retrieve_physical_file_name_or_brows function in response.c.

Multiple stack-based buffer overflows in MinaliC 2.0.0 allow remote attackers to execute arbitrary code via a (1) session_id cookie in a request to the get_cookie_value function in response.c, (2) directory name in a request to the add_default_file function in response.c, or (3) file name in a request to the retrieve_physical_file_name_or_brows function in response.c.

EPSS

Процентиль: 89%
0.04271
Низкий

Дефекты

CWE-119

Связанные уязвимости

nvd
больше 11 лет назад

Multiple stack-based buffer overflows in MinaliC 2.0.0 allow remote attackers to execute arbitrary code via a (1) session_id cookie in a request to the get_cookie_value function in response.c, (2) directory name in a request to the add_default_file function in response.c, or (3) file name in a request to the retrieve_physical_file_name_or_brows function in response.c.

EPSS

Процентиль: 89%
0.04271
Низкий

Дефекты

CWE-119