Логотип exploitDog
bind:CVE-2005-0162
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2005-0162

Количество 4

Количество 4

ubuntu логотип

CVE-2005-0162

почти 21 год назад

Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.

CVSS2: 7.2
EPSS: Низкий
nvd логотип

CVE-2005-0162

почти 21 год назад

Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.

CVSS2: 7.2
EPSS: Низкий
debian логотип

CVE-2005-0162

почти 21 год назад

Stack-based buffer overflow in the get_internal_addresses function in ...

CVSS2: 7.2
EPSS: Низкий
github логотип

GHSA-fg53-7fcw-mx53

больше 3 лет назад

Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2005-0162

Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.

CVSS2: 7.2
4%
Низкий
почти 21 год назад
nvd логотип
CVE-2005-0162

Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.

CVSS2: 7.2
4%
Низкий
почти 21 год назад
debian логотип
CVE-2005-0162

Stack-based buffer overflow in the get_internal_addresses function in ...

CVSS2: 7.2
4%
Низкий
почти 21 год назад
github логотип
GHSA-fg53-7fcw-mx53

Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.

4%
Низкий
больше 3 лет назад

Уязвимостей на страницу