Логотип exploitDog
bind:CVE-2023-34364
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-34364

Количество 2

Количество 2

nvd логотип

CVE-2023-34364

больше 2 лет назад

A buffer overflow was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. An overly large value for certain options of a connection string may overrun the buffer allocated to process the string value. This allows an attacker to execute code of their choice on an affected host by copying carefully selected data that will be executed as code.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-q2w3-vxgc-67jq

больше 2 лет назад

A buffer overflow was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. An overly large value for certain options of a connection string may overrun the buffer allocated to process the string value. This allows an attacker to execute code of their choice on an affected host by copying carefully selected data that will be executed as code.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-34364

A buffer overflow was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. An overly large value for certain options of a connection string may overrun the buffer allocated to process the string value. This allows an attacker to execute code of their choice on an affected host by copying carefully selected data that will be executed as code.

CVSS3: 9.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-q2w3-vxgc-67jq

A buffer overflow was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. An overly large value for certain options of a connection string may overrun the buffer allocated to process the string value. This allows an attacker to execute code of their choice on an affected host by copying carefully selected data that will be executed as code.

CVSS3: 9.8
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу