Логотип exploitDog
bind:CVE-2002-0573
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2002-0573

Количество 2

Количество 2

nvd логотип

CVE-2002-0573

около 23 лет назад

Format string vulnerability in RPC wall daemon (rpc.rwalld) for Solaris 2.5.1 through 8 allows remote attackers to execute arbitrary code via format strings in a message that is not properly provided to the syslog function when the wall command cannot be executed.

CVSS2: 7.5
EPSS: Средний
github логотип

GHSA-w2pc-9pgf-c47r

больше 3 лет назад

Format string vulnerability in RPC wall daemon (rpc.rwalld) for Solaris 2.5.1 through 8 allows remote attackers to execute arbitrary code via format strings in a message that is not properly provided to the syslog function when the wall command cannot be executed.

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2002-0573

Format string vulnerability in RPC wall daemon (rpc.rwalld) for Solaris 2.5.1 through 8 allows remote attackers to execute arbitrary code via format strings in a message that is not properly provided to the syslog function when the wall command cannot be executed.

CVSS2: 7.5
47%
Средний
около 23 лет назад
github логотип
GHSA-w2pc-9pgf-c47r

Format string vulnerability in RPC wall daemon (rpc.rwalld) for Solaris 2.5.1 through 8 allows remote attackers to execute arbitrary code via format strings in a message that is not properly provided to the syslog function when the wall command cannot be executed.

47%
Средний
больше 3 лет назад

Уязвимостей на страницу