Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w2gw-fm5w-qmrj

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the AgentX::receive_agentx function in AgentX++ 1.4.16, as used in RealNetworks Helix Server and Helix Mobile Server 11.x through 13.x and other products, allows remote attackers to execute arbitrary code via unspecified vectors.

Stack-based buffer overflow in the AgentX::receive_agentx function in AgentX++ 1.4.16, as used in RealNetworks Helix Server and Helix Mobile Server 11.x through 13.x and other products, allows remote attackers to execute arbitrary code via unspecified vectors.

EPSS

Процентиль: 99%
0.77594
Высокий

Дефекты

CWE-119

Связанные уязвимости

nvd
почти 16 лет назад

Stack-based buffer overflow in the AgentX::receive_agentx function in AgentX++ 1.4.16, as used in RealNetworks Helix Server and Helix Mobile Server 11.x through 13.x and other products, allows remote attackers to execute arbitrary code via unspecified vectors.

EPSS

Процентиль: 99%
0.77594
Высокий

Дефекты

CWE-119