Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vwp3-gw47-hmq2

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in SafeNet SoftRemote 10.8.5 (Build 2) and 10.3.5 (Build 6), and possibly other versions before 10.8.9, allows local users to execute arbitrary code via a long string in a (1) TREENAME or (2) GROUPNAME Policy file (spd).

Stack-based buffer overflow in SafeNet SoftRemote 10.8.5 (Build 2) and 10.3.5 (Build 6), and possibly other versions before 10.8.9, allows local users to execute arbitrary code via a long string in a (1) TREENAME or (2) GROUPNAME Policy file (spd).

EPSS

Процентиль: 91%
0.06573
Низкий

Дефекты

CWE-119

Связанные уязвимости

nvd
больше 16 лет назад

Stack-based buffer overflow in SafeNet SoftRemote 10.8.5 (Build 2) and 10.3.5 (Build 6), and possibly other versions before 10.8.9, allows local users to execute arbitrary code via a long string in a (1) TREENAME or (2) GROUPNAME Policy file (spd).

EPSS

Процентиль: 91%
0.06573
Низкий

Дефекты

CWE-119