Количество 4
Количество 4
CVE-2010-2628
The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 does not properly check the return values of snprintf calls, which allows remote attackers to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows.
CVE-2010-2628
The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 does not properly check the return values of snprintf calls, which allows remote attackers to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows.
CVE-2010-2628
The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 ...
GHSA-5ccj-qrf4-3667
The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 does not properly check the return values of snprintf calls, which allows remote attackers to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2010-2628 The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 does not properly check the return values of snprintf calls, which allows remote attackers to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows. | CVSS2: 7.5 | 6% Низкий | больше 15 лет назад | |
CVE-2010-2628 The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 does not properly check the return values of snprintf calls, which allows remote attackers to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows. | CVSS2: 7.5 | 6% Низкий | больше 15 лет назад | |
CVE-2010-2628 The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 ... | CVSS2: 7.5 | 6% Низкий | больше 15 лет назад | |
GHSA-5ccj-qrf4-3667 The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 does not properly check the return values of snprintf calls, which allows remote attackers to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows. | 6% Низкий | больше 3 лет назад |
Уязвимостей на страницу