SuperScan v4.1 was discovered to contain a buffer overflow via the Hostname/IP parameter.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://exploitart.ist/exploit/2023/09/18/superscan-os-command-injection.html | broken link |