Логотип exploitDog
bind:CVE-2023-32273
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-32273

Количество 2

Количество 2

nvd логотип

CVE-2023-32273

больше 2 лет назад

Stack-based buffer overflow vulnerability exists in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0. Opening a specially crafted SIM2 file may lead to information disclosure and/or arbitrary code execution. This vulnerability is different from CVE-2023-32538 and CVE-2023-32201.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-3cmh-gq9x-m8v8

больше 2 лет назад

Stack-based buffer overflow vulnerability exists in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0. Opening a specially crafted SIM2 file may lead to information disclosure and/or arbitrary code execution. This vulnerability is different from CVE-2023-32538 and CVE-2023-32201.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-32273

Stack-based buffer overflow vulnerability exists in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0. Opening a specially crafted SIM2 file may lead to information disclosure and/or arbitrary code execution. This vulnerability is different from CVE-2023-32538 and CVE-2023-32201.

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-3cmh-gq9x-m8v8

Stack-based buffer overflow vulnerability exists in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0. Opening a specially crafted SIM2 file may lead to information disclosure and/or arbitrary code execution. This vulnerability is different from CVE-2023-32538 and CVE-2023-32201.

CVSS3: 7.8
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу