Exploit Best Way GEM Engine - Multiple Vulnerabilities

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
33980
Проверка EDB
  1. Пройдено
Автор
LUIGI AURIEMMA
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
N/A
Дата публикации
2009-10-12
Код:
source: https://www.securityfocus.com/bid/40145/info

GEM Engine is prone to multiple vulnerabilities including multiple denial-of-service issues and a buffer-overflow issue.

An attacker can exploit these issues to cause applications using the engine to crash, resulting in a denial-of-service condition, or to execute arbitrary code in the context of the vulnerable application. Other attacks may also be possible.

GEM Engine 2 and GEM Engine 3 are vulnerable. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33980.zip
 
Источник
www.exploit-db.com

Похожие темы