10
CVE-2010-3085
- EPSS 0.85%
- Veröffentlicht 12.10.2010 21:00:02
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
The network-play implementation in Mednafen before 0.8.D might allow remote servers to execute arbitrary code via unspecified vectors, related to "stack manipulation" issues.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
David Shadoff ≫ Mednafen Version <= 0.8.c
David Shadoff ≫ Mednafen Version0.2.0
David Shadoff ≫ Mednafen Version0.2.1
David Shadoff ≫ Mednafen Version0.2.2
David Shadoff ≫ Mednafen Version0.3.6
David Shadoff ≫ Mednafen Version0.3.7
David Shadoff ≫ Mednafen Version0.4.3
David Shadoff ≫ Mednafen Version0.5.0
David Shadoff ≫ Mednafen Version0.5.1
David Shadoff ≫ Mednafen Version0.5.2
David Shadoff ≫ Mednafen Version0.6.0
David Shadoff ≫ Mednafen Version0.6.1
David Shadoff ≫ Mednafen Version0.6.2
David Shadoff ≫ Mednafen Version0.6.3
David Shadoff ≫ Mednafen Version0.6.4
David Shadoff ≫ Mednafen Version0.6.5
David Shadoff ≫ Mednafen Version0.7.0
David Shadoff ≫ Mednafen Version0.7.1
David Shadoff ≫ Mednafen Version0.7.2
David Shadoff ≫ Mednafen Version0.8.1
David Shadoff ≫ Mednafen Version0.8.4
David Shadoff ≫ Mednafen Version0.8.4 Updaterc1
David Shadoff ≫ Mednafen Version0.8.4 Updaterc2
David Shadoff ≫ Mednafen Version0.8.4 Updaterc3
David Shadoff ≫ Mednafen Version0.8.5
David Shadoff ≫ Mednafen Version0.8.6
David Shadoff ≫ Mednafen Version0.8.7
David Shadoff ≫ Mednafen Version0.8.8
David Shadoff ≫ Mednafen Version0.8.9
David Shadoff ≫ Mednafen Version0.8.a
David Shadoff ≫ Mednafen Version0.8.b
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.85% | 0.728 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.