Описание
Stack-based buffer overflow in Novell GroupWise Messenger before 2.0 Public Beta 2 allows remote attackers to execute arbitrary code via a long Accept-Language value without a comma or semicolon. NOTE: due to a typo, the original ZDI advisory accidentally referenced CVE-2006-0092. This is the correct identifier.
Ссылки
- Patch
- Patch
- PatchVendor Advisory
- Patch
- Patch
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:novell:groupwise_messenger:2.0:*:*:*:*:*:*:*
EPSS
Процентиль: 100%
0.88808
Высокий
10 Critical
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Stack-based buffer overflow in Novell GroupWise Messenger before 2.0 Public Beta 2 allows remote attackers to execute arbitrary code via a long Accept-Language value without a comma or semicolon. NOTE: due to a typo, the original ZDI advisory accidentally referenced CVE-2006-0092. This is the correct identifier.
EPSS
Процентиль: 100%
0.88808
Высокий
10 Critical
CVSS2
Дефекты
NVD-CWE-Other