Логотип exploitDog
bind:CVE-2019-1372
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-1372

Количество 4

Количество 4

nvd логотип

CVE-2019-1372

почти 6 лет назад

An remote code execution vulnerability exists when Azure App Service/ Antares on Azure Stack fails to check the length of a buffer prior to copying memory to it.An attacker who successfully exploited this vulnerability could allow an unprivileged function run by the user to execute code in the context of NT AUTHORITY\system thereby escaping the Sandbox.The security update addresses the vulnerability by ensuring that Azure App Service sanitizes user inputs., aka 'Azure App Service Remote Code Execution Vulnerability'.

CVSS3: 10
EPSS: Низкий
msrc логотип

CVE-2019-1372

почти 6 лет назад

Azure Stack Remote Code Execution Vulnerability

EPSS: Низкий
github логотип

GHSA-649f-8c3w-9g8g

больше 3 лет назад

An remote code execution vulnerability exists when Azure App Service/ Antares on Azure Stack fails to check the length of a buffer prior to copying memory to it.An attacker who successfully exploited this vulnerability could allow an unprivileged function run by the user to execute code in the context of NT AUTHORITY\system thereby escaping the Sandbox.The security update addresses the vulnerability by ensuring that Azure App Service sanitizes user inputs., aka 'Azure App Service Remote Code Execution Vulnerability'.

EPSS: Низкий
fstec логотип

BDU:2019-03863

почти 6 лет назад

Уязвимость компонента Azure App Services программной платформы Azure Stack, позволяющая нарушителю выполнить произвольный код

CVSS3: 10
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-1372

An remote code execution vulnerability exists when Azure App Service/ Antares on Azure Stack fails to check the length of a buffer prior to copying memory to it.An attacker who successfully exploited this vulnerability could allow an unprivileged function run by the user to execute code in the context of NT AUTHORITY\system thereby escaping the Sandbox.The security update addresses the vulnerability by ensuring that Azure App Service sanitizes user inputs., aka 'Azure App Service Remote Code Execution Vulnerability'.

CVSS3: 10
4%
Низкий
почти 6 лет назад
msrc логотип
CVE-2019-1372

Azure Stack Remote Code Execution Vulnerability

4%
Низкий
почти 6 лет назад
github логотип
GHSA-649f-8c3w-9g8g

An remote code execution vulnerability exists when Azure App Service/ Antares on Azure Stack fails to check the length of a buffer prior to copying memory to it.An attacker who successfully exploited this vulnerability could allow an unprivileged function run by the user to execute code in the context of NT AUTHORITY\system thereby escaping the Sandbox.The security update addresses the vulnerability by ensuring that Azure App Service sanitizes user inputs., aka 'Azure App Service Remote Code Execution Vulnerability'.

4%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-03863

Уязвимость компонента Azure App Services программной платформы Azure Stack, позволяющая нарушителю выполнить произвольный код

CVSS3: 10
4%
Низкий
почти 6 лет назад

Уязвимостей на страницу