Описание
Buffer overflows in Ecartis (formerly Listar) 1.0.0 in snapshot 20020427 and earlier allow local users to gain privileges via (1) a long command line argument, which is not properly handled in core.c, or possibly via bad uses of sprintf() in (2) moderate.c, (3) lcgi.c, (4) fileapi.c, (5) cookie.c, (6) codes.c, or other files.
Ссылки
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:ecartis:ecartis:1.0.0_snapshot_2002-01-21:*:*:*:*:*:*:*
cpe:2.3:a:ecartis:ecartis:1.0.0_snapshot_2002-01-25:*:*:*:*:*:*:*
cpe:2.3:a:listar:listar:0.126a:*:*:*:*:*:*:*
cpe:2.3:a:listar:listar:0.127a:*:*:*:*:*:*:*
cpe:2.3:a:listar:listar:0.129a:*:*:*:*:*:*:*
EPSS
Процентиль: 71%
0.00661
Низкий
4.6 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Buffer overflows in Ecartis (formerly Listar) 1.0.0 in snapshot 20020427 and earlier allow local users to gain privileges via (1) a long command line argument, which is not properly handled in core.c, or possibly via bad uses of sprintf() in (2) moderate.c, (3) lcgi.c, (4) fileapi.c, (5) cookie.c, (6) codes.c, or other files.
EPSS
Процентиль: 71%
0.00661
Низкий
4.6 Medium
CVSS2
Дефекты
NVD-CWE-Other