Vulnerability Details : CVE-2008-5282
Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0.1 allow remote attackers to execute arbitrary code via (1) a link with a long HREF attribute, and (2) a DIV tag with a long id attribute.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2008-5282
Probability of exploitation activity in the next 30 days: 74.65%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 98 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-5282
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
[email protected] |
CWE ids for CVE-2008-5282
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: [email protected] (Primary)
References for CVE-2008-5282
-
http://www.securityfocus.com/archive/1/498578/100/0/threaded
-
http://www.vupen.com/english/advisories/2008/3255
-
http://www.bmgsec.com.au/advisory/41/
Exploit
-
http://securityreason.com/securityalert/4657
-
http://www.securityfocus.com/bid/32442
-
http://www.securityfocus.com/archive/1/498583/100/0/threaded
-
http://www.bmgsec.com.au/advisory/40/
Exploit
Products affected by CVE-2008-5282
- cpe:2.3:a:w3c:amaya_web_browser:10.0.1:*:*:*:*:*:*:*