Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pq4c-xvv6-cr96

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple buffer overflows in ActiveX controls used by Trend Micro HouseCall 5.5 and 5.7, and Damage Cleanup Server 1.0, allow remote attackers to execute arbitrary code via long parameter strings.

Multiple buffer overflows in ActiveX controls used by Trend Micro HouseCall 5.5 and 5.7, and Damage Cleanup Server 1.0, allow remote attackers to execute arbitrary code via long parameter strings.

EPSS

Процентиль: 86%
0.03077
Низкий

Связанные уязвимости

nvd
больше 22 лет назад

Multiple buffer overflows in ActiveX controls used by Trend Micro HouseCall 5.5 and 5.7, and Damage Cleanup Server 1.0, allow remote attackers to execute arbitrary code via long parameter strings.

EPSS

Процентиль: 86%
0.03077
Низкий