Логотип exploitDog
bind:CVE-2012-10023
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2012-10023

Количество 2

Количество 2

nvd логотип

CVE-2012-10023

6 месяцев назад

A stack-based buffer overflow vulnerability exists in FreeFloat FTP Server version 1.0.0. The server fails to properly validate input passed to the USER command, allowing remote attackers to overwrite memory and potentially execute arbitrary code. The flaw is triggered by sending an overly long username string, which overflows the buffer allocated for user authentication.

CVSS3: 9.8
EPSS: Высокий
github логотип

GHSA-v5vr-r7j6-q2w6

6 месяцев назад

A stack-based buffer overflow vulnerability exists in FreeFloat FTP Server version 1.0.0. The server fails to properly validate input passed to the USER command, allowing remote attackers to overwrite memory and potentially execute arbitrary code. The flaw is triggered by sending an overly long username string, which overflows the buffer allocated for user authentication.

CVSS3: 9.8
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2012-10023

A stack-based buffer overflow vulnerability exists in FreeFloat FTP Server version 1.0.0. The server fails to properly validate input passed to the USER command, allowing remote attackers to overwrite memory and potentially execute arbitrary code. The flaw is triggered by sending an overly long username string, which overflows the buffer allocated for user authentication.

CVSS3: 9.8
71%
Высокий
6 месяцев назад
github логотип
GHSA-v5vr-r7j6-q2w6

A stack-based buffer overflow vulnerability exists in FreeFloat FTP Server version 1.0.0. The server fails to properly validate input passed to the USER command, allowing remote attackers to overwrite memory and potentially execute arbitrary code. The flaw is triggered by sending an overly long username string, which overflows the buffer allocated for user authentication.

CVSS3: 9.8
71%
Высокий
6 месяцев назад

Уязвимостей на страницу