Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wppp-w39w-5fq5

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in doexec.c in Netcat for Windows 1.1, when running with the -e option, allows remote attackers to execute arbitrary code via a long DNS command.

Stack-based buffer overflow in doexec.c in Netcat for Windows 1.1, when running with the -e option, allows remote attackers to execute arbitrary code via a long DNS command.

EPSS

Процентиль: 99%
0.78963
Высокий

Связанные уязвимости

nvd
около 21 года назад

Stack-based buffer overflow in doexec.c in Netcat for Windows 1.1, when running with the -e option, allows remote attackers to execute arbitrary code via a long DNS command.

debian
около 21 года назад

Stack-based buffer overflow in doexec.c in Netcat for Windows 1.1, whe ...

EPSS

Процентиль: 99%
0.78963
Высокий