Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3774-1 | gross security update |
EUVD |
EUVD-2023-56832 | A stack-based buffer overflow vulnerability in gross 0.9.3 through 1.x before 1.0.4 allows remote attackers to trigger a denial of service (grossd daemon crash) or potentially execute arbitrary code in grossd via crafted SMTP transaction parameters that cause an incorrect strncat for a log entry. |
Ubuntu USN |
USN-6942-1 | Gross vulnerability |
Thu, 20 Mar 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bizdelnick
Bizdelnick gross Debian Debian debian Linux |
|
| CPEs | cpe:2.3:a:bizdelnick:gross:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Bizdelnick
Bizdelnick gross Debian Debian debian Linux |
Thu, 20 Mar 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-787 | |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-20T19:15:07.059Z
Reserved: 2023-12-29T00:00:00.000Z
Link: CVE-2023-52159
Updated: 2024-08-02T22:55:40.212Z
Status : Modified
Published: 2024-03-18T02:15:06.053
Modified: 2025-03-20T20:15:30.210
Link: CVE-2023-52159
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN