Логотип exploitDog
bind:CVE-2005-0162
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2005-0162

Количество 4

Количество 4

ubuntu логотип

CVE-2005-0162

около 21 года назад

Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.

CVSS2: 7.2
EPSS: Низкий
nvd логотип

CVE-2005-0162

около 21 года назад

Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.

CVSS2: 7.2
EPSS: Низкий
debian логотип

CVE-2005-0162

около 21 года назад

Stack-based buffer overflow in the get_internal_addresses function in ...

CVSS2: 7.2
EPSS: Низкий
github логотип

GHSA-fg53-7fcw-mx53

почти 4 года назад

Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2005-0162

Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.

CVSS2: 7.2
4%
Низкий
около 21 года назад
nvd логотип
CVE-2005-0162

Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.

CVSS2: 7.2
4%
Низкий
около 21 года назад
debian логотип
CVE-2005-0162

Stack-based buffer overflow in the get_internal_addresses function in ...

CVSS2: 7.2
4%
Низкий
около 21 года назад
github логотип
GHSA-fg53-7fcw-mx53

Stack-based buffer overflow in the get_internal_addresses function in the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x before 2.3.0, when compiled with XAUTH and PAM enabled, allows remote authenticated attackers to execute arbitrary code.

4%
Низкий
почти 4 года назад

Уязвимостей на страницу