Количество 4
Количество 4
CVE-2021-44496
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can control the size variable and buffer that is passed to a call to memcpy. An attacker can use this to overwrite key data structures and gain control of the flow of execution.
CVE-2021-44496
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can control the size variable and buffer that is passed to a call to memcpy. An attacker can use this to overwrite key data structures and gain control of the flow of execution.
CVE-2021-44496
An issue was discovered in FIS GT.M through V7.0-000 (related to the Y ...
GHSA-7c8m-rjpw-8hh3
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can control the size variable and buffer that is passed to a call to memcpy. An attacker can use this to overwrite key data structures and gain control of the flow of execution.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-44496 An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can control the size variable and buffer that is passed to a call to memcpy. An attacker can use this to overwrite key data structures and gain control of the flow of execution. | CVSS3: 9.8 | 1% Низкий | почти 4 года назад | |
CVE-2021-44496 An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can control the size variable and buffer that is passed to a call to memcpy. An attacker can use this to overwrite key data structures and gain control of the flow of execution. | CVSS3: 9.8 | 1% Низкий | почти 4 года назад | |
CVE-2021-44496 An issue was discovered in FIS GT.M through V7.0-000 (related to the Y ... | CVSS3: 9.8 | 1% Низкий | почти 4 года назад | |
GHSA-7c8m-rjpw-8hh3 An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can control the size variable and buffer that is passed to a call to memcpy. An attacker can use this to overwrite key data structures and gain control of the flow of execution. | CVSS3: 9.8 | 1% Низкий | почти 4 года назад |
Уязвимостей на страницу