Логотип exploitDog
bind:CVE-2007-6682
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2007-6682

Количество 4

Количество 4

ubuntu логотип

CVE-2007-6682

почти 18 лет назад

Format string vulnerability in the httpd_FileCallBack function (network/httpd.c) in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via format string specifiers in the Connection parameter.

CVSS2: 7.5
EPSS: Средний
nvd логотип

CVE-2007-6682

почти 18 лет назад

Format string vulnerability in the httpd_FileCallBack function (network/httpd.c) in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via format string specifiers in the Connection parameter.

CVSS2: 7.5
EPSS: Средний
debian логотип

CVE-2007-6682

почти 18 лет назад

Format string vulnerability in the httpd_FileCallBack function (networ ...

CVSS2: 7.5
EPSS: Средний
github логотип

GHSA-prxp-p3xh-w4mq

больше 3 лет назад

Format string vulnerability in the httpd_FileCallBack function (network/httpd.c) in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via format string specifiers in the Connection parameter.

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2007-6682

Format string vulnerability in the httpd_FileCallBack function (network/httpd.c) in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via format string specifiers in the Connection parameter.

CVSS2: 7.5
22%
Средний
почти 18 лет назад
nvd логотип
CVE-2007-6682

Format string vulnerability in the httpd_FileCallBack function (network/httpd.c) in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via format string specifiers in the Connection parameter.

CVSS2: 7.5
22%
Средний
почти 18 лет назад
debian логотип
CVE-2007-6682

Format string vulnerability in the httpd_FileCallBack function (networ ...

CVSS2: 7.5
22%
Средний
почти 18 лет назад
github логотип
GHSA-prxp-p3xh-w4mq

Format string vulnerability in the httpd_FileCallBack function (network/httpd.c) in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via format string specifiers in the Connection parameter.

22%
Средний
больше 3 лет назад

Уязвимостей на страницу