Логотип exploitDog
bind:CVE-2021-31227
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-31227

Количество 3

Количество 3

nvd логотип

CVE-2021-31227

больше 4 лет назад

An issue was discovered in HCC embedded InterNiche 4.0.1. A potential heap buffer overflow exists in the code that parses the HTTP POST request, due to an incorrect signed integer comparison. This vulnerability requires the attacker to send a malformed HTTP packet with a negative Content-Length, which bypasses the size checks and results in a large heap overflow in the wbs_multidata buffer copy.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-29fm-9qqr-x2gp

больше 3 лет назад

An issue was discovered in HCC embedded InterNiche 4.0.1. A potential heap buffer overflow exists in the code that parses the HTTP POST request, due to an incorrect signed integer comparison. This vulnerability requires the attacker to send a malformed HTTP packet with a negative Content-Length, which bypasses the size checks and results in a large heap overflow in the wbs_multidata buffer copy.

EPSS: Низкий
fstec логотип

BDU:2021-04489

больше 4 лет назад

Уязвимость стеков TCP/IP NicheLite и InterNiche, связанная со сравнением числовых диапазонов без минимальной проверки, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-31227

An issue was discovered in HCC embedded InterNiche 4.0.1. A potential heap buffer overflow exists in the code that parses the HTTP POST request, due to an incorrect signed integer comparison. This vulnerability requires the attacker to send a malformed HTTP packet with a negative Content-Length, which bypasses the size checks and results in a large heap overflow in the wbs_multidata buffer copy.

CVSS3: 7.5
0%
Низкий
больше 4 лет назад
github логотип
GHSA-29fm-9qqr-x2gp

An issue was discovered in HCC embedded InterNiche 4.0.1. A potential heap buffer overflow exists in the code that parses the HTTP POST request, due to an incorrect signed integer comparison. This vulnerability requires the attacker to send a malformed HTTP packet with a negative Content-Length, which bypasses the size checks and results in a large heap overflow in the wbs_multidata buffer copy.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-04489

Уязвимость стеков TCP/IP NicheLite и InterNiche, связанная со сравнением числовых диапазонов без минимальной проверки, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу