Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qvcf-rgf7-ff3j

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

c2s/c2s.c in Jabber Open Source Server 2.3.2 and earlier truncates data without ensuring it remains valid UTF-8, which allows remote authenticated users to read system memory or possibly have other unspecified impact via a crafted JID.

c2s/c2s.c in Jabber Open Source Server 2.3.2 and earlier truncates data without ensuring it remains valid UTF-8, which allows remote authenticated users to read system memory or possibly have other unspecified impact via a crafted JID.

EPSS

Процентиль: 65%
0.00483
Низкий

Дефекты

CWE-200

Связанные уязвимости

ubuntu
больше 10 лет назад

c2s/c2s.c in Jabber Open Source Server 2.3.2 and earlier truncates data without ensuring it remains valid UTF-8, which allows remote authenticated users to read system memory or possibly have other unspecified impact via a crafted JID.

redhat
почти 11 лет назад

c2s/c2s.c in Jabber Open Source Server 2.3.2 and earlier truncates data without ensuring it remains valid UTF-8, which allows remote authenticated users to read system memory or possibly have other unspecified impact via a crafted JID.

nvd
больше 10 лет назад

c2s/c2s.c in Jabber Open Source Server 2.3.2 and earlier truncates data without ensuring it remains valid UTF-8, which allows remote authenticated users to read system memory or possibly have other unspecified impact via a crafted JID.

debian
больше 10 лет назад

c2s/c2s.c in Jabber Open Source Server 2.3.2 and earlier truncates dat ...

EPSS

Процентиль: 65%
0.00483
Низкий

Дефекты

CWE-200