Количество 3
Количество 3
CVE-2023-48725
A stack-based buffer overflow vulnerability exists in the JSON Parsing getblockschedule() functionality of Netgear RAX30 1.0.11.96 and 1.0.7.78. A specially crafted HTTP request can lead to code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
GHSA-jf3p-h292-vfq5
A stack-based buffer overflow vulnerability exists in the JSON Parsing getblockschedule() functionality of Netgear RAX30 1.0.11.96 and 1.0.7.78. A specially crafted HTTP request can lead to code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
BDU:2024-01918
Уязвимость функции getblockschedule() синтаксического анализа JSON микропрограммного обеспечения маршрутизаторов NETGEAR RAX28, RAX29, RAX30, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-48725 A stack-based buffer overflow vulnerability exists in the JSON Parsing getblockschedule() functionality of Netgear RAX30 1.0.11.96 and 1.0.7.78. A specially crafted HTTP request can lead to code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. | CVSS3: 7.2 | 31% Средний | почти 2 года назад | |
GHSA-jf3p-h292-vfq5 A stack-based buffer overflow vulnerability exists in the JSON Parsing getblockschedule() functionality of Netgear RAX30 1.0.11.96 and 1.0.7.78. A specially crafted HTTP request can lead to code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. | CVSS3: 7.2 | 31% Средний | почти 2 года назад | |
BDU:2024-01918 Уязвимость функции getblockschedule() синтаксического анализа JSON микропрограммного обеспечения маршрутизаторов NETGEAR RAX28, RAX29, RAX30, позволяющая нарушителю выполнить произвольный код | CVSS3: 7.2 | 31% Средний | почти 2 года назад |
Уязвимостей на страницу