cve/2006/CVE-2006-0992.md
2024-06-18 02:51:15 +02:00

18 lines
776 B
Markdown

### [CVE-2006-0992](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0992)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Stack-based buffer overflow in Novell GroupWise Messenger before 2.0 Public Beta 2 allows remote attackers to execute arbitrary code via a long Accept-Language value without a comma or semicolon. NOTE: due to a typo, the original ZDI advisory accidentally referenced CVE-2006-0092. This is the correct identifier.
### POC
#### Reference
- https://www.exploit-db.com/exploits/1679
#### Github
No PoCs found on GitHub currently.