Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m9xq-xgvf-jw86

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in Sielco Sistemi Winlog Pro 2.07.00 and earlier, when Run TCP/IP server is enabled, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted 0x02 opcode to TCP port 46823.

Stack-based buffer overflow in Sielco Sistemi Winlog Pro 2.07.00 and earlier, when Run TCP/IP server is enabled, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted 0x02 opcode to TCP port 46823.

EPSS

Процентиль: 99%
0.7109
Высокий

Дефекты

CWE-119

Связанные уязвимости

nvd
около 15 лет назад

Stack-based buffer overflow in Sielco Sistemi Winlog Pro 2.07.00 and earlier, when Run TCP/IP server is enabled, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted 0x02 opcode to TCP port 46823.

EPSS

Процентиль: 99%
0.7109
Высокий

Дефекты

CWE-119