RSS   Vulnerabilities for 'Shadow'   RSS

2019-11-14
 
CVE-2019-16110

CWE-20
 

 
The network protocol of Blade Shadow though 2.13.3 allows remote attackers to take control of a Shadow instance and execute arbitrary code by only knowing the victim's IP address, because packet data can be injected into the unencrypted UDP packet stream.

 


Copyright 2024, cxsecurity.com

 

Back to Top