Логотип exploitDog
bind:CVE-2015-7892
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2015-7892

Количество 2

Количество 2

nvd логотип

CVE-2015-7892

около 6 лет назад

Stack-based buffer overflow in the m2m1shot_compat_ioctl32 function in the Samsung m2m1shot driver framework, as used in Samsung S6 Edge, allows local users to have unspecified impact via a large data.buf_out.num_planes value in an ioctl call.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-wxxf-gxv9-5j54

больше 3 лет назад

Stack-based buffer overflow in the m2m1shot_compat_ioctl32 function in the Samsung m2m1shot driver framework, as used in Samsung S6 Edge, allows local users to have unspecified impact via a large data.buf_out.num_planes value in an ioctl call.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2015-7892

Stack-based buffer overflow in the m2m1shot_compat_ioctl32 function in the Samsung m2m1shot driver framework, as used in Samsung S6 Edge, allows local users to have unspecified impact via a large data.buf_out.num_planes value in an ioctl call.

CVSS3: 7.8
0%
Низкий
около 6 лет назад
github логотип
GHSA-wxxf-gxv9-5j54

Stack-based buffer overflow in the m2m1shot_compat_ioctl32 function in the Samsung m2m1shot driver framework, as used in Samsung S6 Edge, allows local users to have unspecified impact via a large data.buf_out.num_planes value in an ioctl call.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу