CVE-2015-10065

A vulnerability classified as critical was found in AenBleidd FiND. This vulnerability affects the function init_result of the file validator/my_validator.cpp. The manipulation leads to buffer overflow. The patch is identified as ee2eef34a83644f286c9adcaf30437f92e9c48f1. It is recommended to apply a patch to fix this issue. VDB-218458 is the identifier assigned to this vulnerability.
References
Link Resource
https://github.com/AenBleidd/FiND/commit/ee2eef34a83644f286c9adcaf30437f92e9c48f1 Patch Third Party Advisory
https://vuldb.com/?ctiid.218458 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.218458 Permissions Required Third Party Advisory VDB Entry
https://github.com/AenBleidd/FiND/commit/ee2eef34a83644f286c9adcaf30437f92e9c48f1 Patch Third Party Advisory
https://vuldb.com/?ctiid.218458 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.218458 Permissions Required Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:find_project:find:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:24

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad en AenBleidd FiND y se ha clasificado como crítica. Esta vulnerabilidad afecta a la función init_result del archivo validator/my_validator.cpp. La manipulación provoca un desbordamiento del búfer. El parche se identifica como ee2eef34a83644f286c9adcaf30437f92e9c48f1. Se recomienda aplicar un parche para solucionar este problema. VDB-218458 es el identificador asignado a esta vulnerabilidad.
CVSS v2 : 5.2
v3 : 9.8
v2 : 5.2
v3 : 5.5
References () https://github.com/AenBleidd/FiND/commit/ee2eef34a83644f286c9adcaf30437f92e9c48f1 - Patch, Third Party Advisory () https://github.com/AenBleidd/FiND/commit/ee2eef34a83644f286c9adcaf30437f92e9c48f1 - Patch, Third Party Advisory
References () https://vuldb.com/?ctiid.218458 - Permissions Required, Third Party Advisory, VDB Entry () https://vuldb.com/?ctiid.218458 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?id.218458 - Permissions Required, Third Party Advisory, VDB Entry () https://vuldb.com/?id.218458 - Permissions Required, Third Party Advisory, VDB Entry

07 Nov 2023, 02:23

Type Values Removed Values Added
CWE CWE-120

20 Oct 2023, 09:15

Type Values Removed Values Added
Summary A vulnerability classified as critical was found in AenBleidd FiND. This vulnerability affects the function init_result of the file validator/my_validator.cpp. The manipulation leads to buffer overflow. The name of the patch is ee2eef34a83644f286c9adcaf30437f92e9c48f1. It is recommended to apply a patch to fix this issue. VDB-218458 is the identifier assigned to this vulnerability. A vulnerability classified as critical was found in AenBleidd FiND. This vulnerability affects the function init_result of the file validator/my_validator.cpp. The manipulation leads to buffer overflow. The patch is identified as ee2eef34a83644f286c9adcaf30437f92e9c48f1. It is recommended to apply a patch to fix this issue. VDB-218458 is the identifier assigned to this vulnerability.
CWE CWE-120

Information

Published : 2023-01-17 23:15

Updated : 2024-11-21 02:24


NVD link : CVE-2015-10065

Mitre link : CVE-2015-10065

CVE.ORG link : CVE-2015-10065


JSON object : View

Products Affected

find_project

  • find
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')