vendor:
lquerylv
by:
Unknown
N/A
CVSS
CRITICAL
Buffer Overflow
119
CWE
Product Name: lquerylv
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: CVE-Unknown
CPE: a:lquerylv
Other Scripts:
https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/linux/http/zimbra_cpio_cve_2022_41352, https://www.infosecmatter.com/nessus-plugin-library/?id=60449, https://www.infosecmatter.com/nessus-plugin-library/?id=59851, https://www.infosecmatter.com/nessus-plugin-library/?id=47617, https://www.infosecmatter.com/nessus-plugin-library/?id=156935, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/linux/http/zimbra_mboximport_cve_2022_27925, https://www.infosecmatter.com/nessus-plugin-library/?id=78067, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/scanner/rdp/cve_2019_0708_bluekeep, https://www.infosecmatter.com/nessus-plugin-library/?id=136245, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/admin/dcerpc/cve_2021_1675_printnightmare
Platforms Tested:
Unknown
Buffer Overflow in lquerylv
This program is vulnerable to a buffer overflow attack. An attacker can exploit this vulnerability to execute arbitrary code or crash the program.
Mitigation:
The vendor should release a patch to fix the buffer overflow vulnerability. In the meantime, users should avoid running the program with untrusted input.