Логотип exploitDog
bind:CVE-2005-4581
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2005-4581

Количество 3

Количество 3

nvd логотип

CVE-2005-4581

почти 20 лет назад

Buffer overflow in Electric Sheep 2.6.3 client allows local users to execute arbitrary code via a long window-id parameter. NOTE: because the program is not setuid and not normally called from remote programs, there may not be a typical attack vector for the issue that crosses privilege boundaries. Therefore this may not be a vulnerability.

CVSS2: 4.6
EPSS: Низкий
debian логотип

CVE-2005-4581

почти 20 лет назад

Buffer overflow in Electric Sheep 2.6.3 client allows local users to e ...

CVSS2: 4.6
EPSS: Низкий
github логотип

GHSA-ghvr-mv7w-8r6f

больше 3 лет назад

Buffer overflow in Electric Sheep 2.6.3 client allows local users to execute arbitrary code via a long window-id parameter. NOTE: because the program is not setuid and not normally called from remote programs, there may not be a typical attack vector for the issue that crosses privilege boundaries. Therefore this may not be a vulnerability.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2005-4581

Buffer overflow in Electric Sheep 2.6.3 client allows local users to execute arbitrary code via a long window-id parameter. NOTE: because the program is not setuid and not normally called from remote programs, there may not be a typical attack vector for the issue that crosses privilege boundaries. Therefore this may not be a vulnerability.

CVSS2: 4.6
0%
Низкий
почти 20 лет назад
debian логотип
CVE-2005-4581

Buffer overflow in Electric Sheep 2.6.3 client allows local users to e ...

CVSS2: 4.6
0%
Низкий
почти 20 лет назад
github логотип
GHSA-ghvr-mv7w-8r6f

Buffer overflow in Electric Sheep 2.6.3 client allows local users to execute arbitrary code via a long window-id parameter. NOTE: because the program is not setuid and not normally called from remote programs, there may not be a typical attack vector for the issue that crosses privilege boundaries. Therefore this may not be a vulnerability.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу