Description
SDoP versions prior to 1.11 fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability. When a user of the affected product is tricked to process a specially crafted XML file, arbitrary code may be executed on the user's environment.
Published: 2024-07-29
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2024-08-02T04:46:52.953Z

Reserved: 2024-07-22T23:33:29.246Z

Link: CVE-2024-41881

cve-icon Vulnrichment

Updated: 2024-08-02T04:46:52.953Z

cve-icon NVD

Status : Deferred

Published: 2024-07-29T09:15:02.773

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-41881

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses