Buffer Overflow vulnerability in libming version 0.4.8, allows attackers to execute arbitrary code and obtain sensitive information via parser.c component.
References
Link | Resource |
---|---|
https://github.com/libming/libming/issues/289 | Exploit Issue Tracking |
https://github.com/libming/libming/pull/290 | Patch |
Configurations
History
28 Dec 2023, 20:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/libming/libming/pull/290 - Patch | |
References | () https://github.com/libming/libming/issues/289 - Exploit, Issue Tracking | |
CPE | cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:* | |
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
20 Dec 2023, 13:50
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-20 09:15
Updated : 2024-02-05 00:22
NVD link : CVE-2023-50628
Mitre link : CVE-2023-50628
CVE.ORG link : CVE-2023-50628
JSON object : View
Products Affected
libming
- libming
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')