CVE-2015-10088
low-risk
Published 2023-03-05
A vulnerability, which was classified as critical, was found in ayttm up to 0.5.0.89. This affects the function http_connect in the library libproxy/proxy.c. The manipulation leads to format string. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The patch is named 40e04680018614a7d2b68566b261b061a0597046. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-222267.
Do I need to act?
-
0.49% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.0/10
Medium
NETWORK
/ HIGH complexity
Affected Products (1)
Ayttm
Affected Vendors
References (8)
Third Party Advisory
https://sourceforge.net/p/ayttm/mailman/message/34397158/
Permissions Required
https://vuldb.com/?ctiid.222267
Third Party Advisory
https://vuldb.com/?id.222267
Third Party Advisory
https://sourceforge.net/p/ayttm/mailman/message/34397158/
Permissions Required
https://vuldb.com/?ctiid.222267
Third Party Advisory
https://vuldb.com/?id.222267
23
/ 100
low-risk
Severity
16/34 · Moderate
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal