Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-phqx-gjxc-wrp9

Опубликовано: 13 июн. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

Matthias-Wandel/jhead jhead 3.06 is vulnerable to Buffer Overflow via shellescape(), jhead.c, jhead. jhead copies strings to a stack buffer when it detects a &i or &o. However, jhead does not check the boundary of the stack buffer. As a result, there will be a stack buffer overflow problem when multiple &i or &o are given.

Matthias-Wandel/jhead jhead 3.06 is vulnerable to Buffer Overflow via shellescape(), jhead.c, jhead. jhead copies strings to a stack buffer when it detects a &i or &o. However, jhead does not check the boundary of the stack buffer. As a result, there will be a stack buffer overflow problem when multiple &i or &o are given.

EPSS

Процентиль: 26%
0.00094
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-120
CWE-787

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 2 лет назад

Matthias-Wandel/jhead jhead 3.06 is vulnerable to Buffer Overflow via shellescape(), jhead.c, jhead. jhead copies strings to a stack buffer when it detects a &i or &o. However, jhead does not check the boundary of the stack buffer. As a result, there will be a stack buffer overflow problem when multiple `&i` or `&o` are given.

CVSS3: 9.8
nvd
больше 2 лет назад

Matthias-Wandel/jhead jhead 3.06 is vulnerable to Buffer Overflow via shellescape(), jhead.c, jhead. jhead copies strings to a stack buffer when it detects a &i or &o. However, jhead does not check the boundary of the stack buffer. As a result, there will be a stack buffer overflow problem when multiple `&i` or `&o` are given.

CVSS3: 9.8
debian
больше 2 лет назад

Matthias-Wandel/jhead jhead 3.06 is vulnerable to Buffer Overflow via ...

EPSS

Процентиль: 26%
0.00094
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-120
CWE-787