Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mq6c-rp54-x83h

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in FastTrack (FT) network code, as used in Kazaa 2.0.2 and possibly other versions and products, allows remote attackers to execute arbitrary code via a packet containing a large list of supernodes, aka "Packet 0' death."

Buffer overflow in FastTrack (FT) network code, as used in Kazaa 2.0.2 and possibly other versions and products, allows remote attackers to execute arbitrary code via a packet containing a large list of supernodes, aka "Packet 0' death."

EPSS

Процентиль: 87%
0.0321
Низкий

Связанные уязвимости

nvd
больше 22 лет назад

Buffer overflow in FastTrack (FT) network code, as used in Kazaa 2.0.2 and possibly other versions and products, allows remote attackers to execute arbitrary code via a packet containing a large list of supernodes, aka "Packet 0' death."

EPSS

Процентиль: 87%
0.0321
Низкий