Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-58034 | Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in cgi component in Synology SSL VPN Client before 1.4.7-0687 allows local users to conduct denial-of-service attacks via unspecified vectors. |
Wed, 18 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: synology
Published:
Updated: 2024-09-17T14:18:30.321Z
Reserved: 2023-10-24T06:10:16.429Z
Link: CVE-2023-5748
Updated: 2024-08-02T08:07:32.620Z
Status : Modified
Published: 2023-11-07T04:24:19.670
Modified: 2024-11-21T08:42:24.430
Link: CVE-2023-5748
No data.
OpenCVE Enrichment
No data.
EUVD