Количество 7
Количество 7
GHSA-hvf5-wpx9-vrrj
Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.
CVE-2013-6487
Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.
CVE-2013-6487
Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.
CVE-2013-6487
Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.
CVE-2013-6487
Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu ...
BDU:2015-00086
Уязвимость системы мгновенного обмена сообщениями Pidgin, позволяющая удаленному злоумышленнику вызвать отказ в обслуживании или выполнить произвольный код
ELSA-2014-0139
ELSA-2014-0139: pidgin security update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-hvf5-wpx9-vrrj Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow. | 3% Низкий | больше 3 лет назад | ||
CVE-2013-6487 Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow. | CVSS2: 7.5 | 3% Низкий | почти 12 лет назад | |
CVE-2013-6487 Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow. | CVSS2: 4.3 | 3% Низкий | почти 12 лет назад | |
CVE-2013-6487 Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow. | CVSS2: 7.5 | 3% Низкий | почти 12 лет назад | |
CVE-2013-6487 Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu ... | CVSS2: 7.5 | 3% Низкий | почти 12 лет назад | |
BDU:2015-00086 Уязвимость системы мгновенного обмена сообщениями Pidgin, позволяющая удаленному злоумышленнику вызвать отказ в обслуживании или выполнить произвольный код | CVSS2: 7.5 | 3% Низкий | больше 11 лет назад | |
ELSA-2014-0139 ELSA-2014-0139: pidgin security update (MODERATE) | почти 12 лет назад |
Уязвимостей на страницу