Логотип exploitDog
bind:CVE-2007-3210
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2007-3210

Количество 2

Количество 2

nvd логотип

CVE-2007-3210

больше 18 лет назад

Stack-based buffer overflow in nptoken.mox in the Cellosoft Tokens Object 2.0.0.6 extension for Vitalize! allows remote attackers to execute arbitrary code via a long string argument to the RemoveChr method. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

CVSS2: 9.3
EPSS: Низкий
github логотип

GHSA-h4wm-q3c7-xjx3

почти 4 года назад

Stack-based buffer overflow in nptoken.mox in the Cellosoft Tokens Object 2.0.0.6 extension for Vitalize! allows remote attackers to execute arbitrary code via a long string argument to the RemoveChr method. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2007-3210

Stack-based buffer overflow in nptoken.mox in the Cellosoft Tokens Object 2.0.0.6 extension for Vitalize! allows remote attackers to execute arbitrary code via a long string argument to the RemoveChr method. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

CVSS2: 9.3
4%
Низкий
больше 18 лет назад
github логотип
GHSA-h4wm-q3c7-xjx3

Stack-based buffer overflow in nptoken.mox in the Cellosoft Tokens Object 2.0.0.6 extension for Vitalize! allows remote attackers to execute arbitrary code via a long string argument to the RemoveChr method. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

4%
Низкий
почти 4 года назад

Уязвимостей на страницу