10195.txt
来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 53 行
TXT
53 行
Rule--Sid10195--Summary:This event is generated when an attempt is made to exploit a known vulnerability in WebMod.--Impact:High--Detailed Information:Stack-based buffer overflow in the connectHandle function in server.cpp in WebMod 0.48 allows remote attackers to execute arbitrary code via a long string in the Content-Length HTTP header.--Affected Systems:WebMod WebMod 0.48--Attack Scenarios:--Ease of Attack:--False Positives:None known.--False Negatives:None known.--Corrective Action:--Contributors:Sourcefire Vulnerability Research TeamThis document was generated from data supplied by the National Vulnerability Database. A product of the National Institute of Standards and Technology.For more information see http://nvd.nist.gov/--Additional References:--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?