Логотип exploitDog
bind:CVE-2012-10060
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2012-10060

Количество 2

Количество 2

nvd логотип

CVE-2012-10060

6 месяцев назад

Sysax Multi Server versions prior to 5.55 contains a stack-based buffer overflow in its SSH service. When a remote attacker supplies an overly long username during authentication, the server copies the input to a fixed-size stack buffer without proper bounds checking. This allows remote code execution under the context of the service.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-74gq-wvgf-56v7

6 месяцев назад

Sysax Multi Server versions prior to 5.55 contains a stack-based buffer overflow in its SSH service. When a remote attacker supplies an overly long username during authentication, the server copies the input to a fixed-size stack buffer without proper bounds checking. This allows remote code execution under the context of the service.

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2012-10060

Sysax Multi Server versions prior to 5.55 contains a stack-based buffer overflow in its SSH service. When a remote attacker supplies an overly long username during authentication, the server copies the input to a fixed-size stack buffer without proper bounds checking. This allows remote code execution under the context of the service.

CVSS3: 9.8
69%
Средний
6 месяцев назад
github логотип
GHSA-74gq-wvgf-56v7

Sysax Multi Server versions prior to 5.55 contains a stack-based buffer overflow in its SSH service. When a remote attacker supplies an overly long username during authentication, the server copies the input to a fixed-size stack buffer without proper bounds checking. This allows remote code execution under the context of the service.

CVSS3: 9.8
69%
Средний
6 месяцев назад

Уязвимостей на страницу