Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wppp-w39w-5fq5

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in doexec.c in Netcat for Windows 1.1, when running with the -e option, allows remote attackers to execute arbitrary code via a long DNS command.

Stack-based buffer overflow in doexec.c in Netcat for Windows 1.1, when running with the -e option, allows remote attackers to execute arbitrary code via a long DNS command.

EPSS

Процентиль: 99%
0.79633
Высокий

Связанные уязвимости

nvd
больше 20 лет назад

Stack-based buffer overflow in doexec.c in Netcat for Windows 1.1, when running with the -e option, allows remote attackers to execute arbitrary code via a long DNS command.

debian
больше 20 лет назад

Stack-based buffer overflow in doexec.c in Netcat for Windows 1.1, whe ...

EPSS

Процентиль: 99%
0.79633
Высокий