Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xc55-qhgh-qjg9

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple heap-based buffer overflows in Topaz Systems SigPlus Pro ActiveX Control 3.95, and possibly other versions before 4.29, allow remote attackers to execute arbitrary code via a long (1) KeyString property, (2) NewPath parameter to the SetLocalIniFilePath method, or (3) NewPortPath parameter to the SetTabletPortPath method.

Multiple heap-based buffer overflows in Topaz Systems SigPlus Pro ActiveX Control 3.95, and possibly other versions before 4.29, allow remote attackers to execute arbitrary code via a long (1) KeyString property, (2) NewPath parameter to the SetLocalIniFilePath method, or (3) NewPortPath parameter to the SetTabletPortPath method.

EPSS

Процентиль: 94%
0.12916
Средний

Дефекты

CWE-119

Связанные уязвимости

nvd
около 15 лет назад

Multiple heap-based buffer overflows in Topaz Systems SigPlus Pro ActiveX Control 3.95, and possibly other versions before 4.29, allow remote attackers to execute arbitrary code via a long (1) KeyString property, (2) NewPath parameter to the SetLocalIniFilePath method, or (3) NewPortPath parameter to the SetTabletPortPath method.

EPSS

Процентиль: 94%
0.12916
Средний

Дефекты

CWE-119