Логотип exploitDog
bind:CVE-2016-1417
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-1417

Количество 3

Количество 3

ubuntu логотип

CVE-2016-1417

около 9 лет назад

Untrusted search path vulnerability in Snort 2.9.7.0-WIN32 allows remote attackers to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse tcapi.dll that is located in the same folder on a remote file share as a pcap file that is being processed.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2016-1417

около 9 лет назад

Untrusted search path vulnerability in Snort 2.9.7.0-WIN32 allows remote attackers to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse tcapi.dll that is located in the same folder on a remote file share as a pcap file that is being processed.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-cr32-cx2f-mfw5

больше 3 лет назад

Untrusted search path vulnerability in Snort 2.9.7.0-WIN32 allows remote attackers to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse tcapi.dll that is located in the same folder on a remote file share as a pcap file that is being processed.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2016-1417

Untrusted search path vulnerability in Snort 2.9.7.0-WIN32 allows remote attackers to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse tcapi.dll that is located in the same folder on a remote file share as a pcap file that is being processed.

CVSS3: 8.8
4%
Низкий
около 9 лет назад
nvd логотип
CVE-2016-1417

Untrusted search path vulnerability in Snort 2.9.7.0-WIN32 allows remote attackers to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse tcapi.dll that is located in the same folder on a remote file share as a pcap file that is being processed.

CVSS3: 8.8
4%
Низкий
около 9 лет назад
github логотип
GHSA-cr32-cx2f-mfw5

Untrusted search path vulnerability in Snort 2.9.7.0-WIN32 allows remote attackers to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse tcapi.dll that is located in the same folder on a remote file share as a pcap file that is being processed.

CVSS3: 8.8
4%
Низкий
больше 3 лет назад

Уязвимостей на страницу