Логотип exploitDog
bind:CVE-2021-32457
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-32457

Количество 2

Количество 2

nvd логотип

CVE-2021-32457

больше 4 лет назад

Trend Micro Home Network Security version 6.6.604 and earlier is vulnerable to an iotcl stack-based buffer overflow vulnerability which could allow an attacker to issue a specially crafted iotcl to escalate privileges on affected devices. An attacker must first obtain the ability to execute low-privileged code on the target device in order to exploit this vulnerability.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-gc5v-4mhp-vqp4

больше 3 лет назад

A privilege escalation vulnerability exists in the tdts.ko chrdev_ioctl_handle functionality of Trend Micro, Inc. Home Network Security 6.1.567. A specially crafted ioctl can lead to increased privileges. An attacker can issue an ioctl to trigger this vulnerability.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-32457

Trend Micro Home Network Security version 6.6.604 and earlier is vulnerable to an iotcl stack-based buffer overflow vulnerability which could allow an attacker to issue a specially crafted iotcl to escalate privileges on affected devices. An attacker must first obtain the ability to execute low-privileged code on the target device in order to exploit this vulnerability.

CVSS3: 7.8
0%
Низкий
больше 4 лет назад
github логотип
GHSA-gc5v-4mhp-vqp4

A privilege escalation vulnerability exists in the tdts.ko chrdev_ioctl_handle functionality of Trend Micro, Inc. Home Network Security 6.1.567. A specially crafted ioctl can lead to increased privileges. An attacker can issue an ioctl to trigger this vulnerability.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу