The application is prone to a stack-based buffer-overflow vulnerability
that occurs because it fails to perform adequate boundary checks on
user-supplied data. Specifically, this issue occurs when performing a
direct peer file search.
that occurs because it fails to perform adequate boundary checks on
user-supplied data. Specifically, this issue occurs when performing a
direct peer file search.
CVE Link
Exploit Type - Old
Exploits/Remote
Exploit Platform
Product Name