Логотип exploitDog
bind:CVE-2013-5582
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2013-5582

Количество 2

Количество 2

nvd логотип

CVE-2013-5582

почти 6 лет назад

Ammyy Admin 3.2 and earlier stores the client ID at a fixed memory location, which might make it easier for user-assisted remote attackers to bypass authentication by running a local program that extracts a field from the AA_v3.2.exe file.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-ppfg-77qf-3457

почти 4 года назад

Ammyy Admin 3.2 and earlier stores the client ID at a fixed memory location, which might make it easier for user-assisted remote attackers to bypass authentication by running a local program that extracts a field from the AA_v3.2.exe file.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2013-5582

Ammyy Admin 3.2 and earlier stores the client ID at a fixed memory location, which might make it easier for user-assisted remote attackers to bypass authentication by running a local program that extracts a field from the AA_v3.2.exe file.

CVSS3: 7.8
4%
Низкий
почти 6 лет назад
github логотип
GHSA-ppfg-77qf-3457

Ammyy Admin 3.2 and earlier stores the client ID at a fixed memory location, which might make it easier for user-assisted remote attackers to bypass authentication by running a local program that extracts a field from the AA_v3.2.exe file.

CVSS3: 7.8
4%
Низкий
почти 4 года назад

Уязвимостей на страницу