Логотип exploitDog
bind:CVE-2023-25267
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-25267

Количество 2

Количество 2

nvd логотип

CVE-2023-25267

почти 3 года назад

An issue was discovered in GFI Kerio Connect 9.4.1 patch 1 (fixed in 10.0.0). There is a stack-based Buffer Overflow in the webmail component's 2FASetup function via an authenticated request with a long primaryEMailAddress field to the webmail/api/jsonrpc URI.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-hj76-6x6q-33x8

почти 3 года назад

An issue was discovered in GFI Kerio Connect 9.4.1 patch 1 (fixed in 10.0.0). There is a stack-based Buffer Overflow in the webmail component's 2FASetup function via an authenticated request with a long primaryEMailAddress field to the webmail/api/jsonrpc URI.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-25267

An issue was discovered in GFI Kerio Connect 9.4.1 patch 1 (fixed in 10.0.0). There is a stack-based Buffer Overflow in the webmail component's 2FASetup function via an authenticated request with a long primaryEMailAddress field to the webmail/api/jsonrpc URI.

CVSS3: 8.8
0%
Низкий
почти 3 года назад
github логотип
GHSA-hj76-6x6q-33x8

An issue was discovered in GFI Kerio Connect 9.4.1 patch 1 (fixed in 10.0.0). There is a stack-based Buffer Overflow in the webmail component's 2FASetup function via an authenticated request with a long primaryEMailAddress field to the webmail/api/jsonrpc URI.

CVSS3: 8.8
0%
Низкий
почти 3 года назад

Уязвимостей на страницу