Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w963-353v-jm7m

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the zzip_open_shared_io function in zzip/file.c in ZZIPlib Library before 0.13.49 allows user-assisted remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long filename.

Stack-based buffer overflow in the zzip_open_shared_io function in zzip/file.c in ZZIPlib Library before 0.13.49 allows user-assisted remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long filename.

EPSS

Процентиль: 90%
0.05948
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

Stack-based buffer overflow in the zzip_open_shared_io function in zzip/file.c in ZZIPlib Library before 0.13.49 allows user-assisted remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long filename.

nvd
больше 18 лет назад

Stack-based buffer overflow in the zzip_open_shared_io function in zzip/file.c in ZZIPlib Library before 0.13.49 allows user-assisted remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long filename.

debian
больше 18 лет назад

Stack-based buffer overflow in the zzip_open_shared_io function in zzi ...

EPSS

Процентиль: 90%
0.05948
Низкий