Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qv8f-prp5-4524

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in GOM Player 2.1.33.5071 allows user-assisted remote attackers to execute arbitrary code via a .ASX file with a long URI in the "ref href" tag. NOTE: this issue exists because of a CVE-2007-0707 regression.

Stack-based buffer overflow in GOM Player 2.1.33.5071 allows user-assisted remote attackers to execute arbitrary code via a .ASX file with a long URI in the "ref href" tag. NOTE: this issue exists because of a CVE-2007-0707 regression.

EPSS

Процентиль: 97%
0.35995
Средний

Дефекты

CWE-119

Связанные уязвимости

nvd
больше 13 лет назад

Stack-based buffer overflow in GOM Player 2.1.33.5071 allows user-assisted remote attackers to execute arbitrary code via a .ASX file with a long URI in the "ref href" tag. NOTE: this issue exists because of a CVE-2007-0707 regression.

EPSS

Процентиль: 97%
0.35995
Средний

Дефекты

CWE-119