{ "schema_version": "1.4.0", "id": "GHSA-cgmc-f9pw-cxc9", "modified": "2022-05-17T02:02:19Z", "published": "2022-05-17T02:02:19Z", "aliases": [ "CVE-2011-0454" ], "details": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0454" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672" }, { "type": "WEB", "url": "http://jvn.jp/en/jp/JVN88991166/index.html" }, { "type": "WEB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014" }, { "type": "WEB", "url": "http://secunia.com/advisories/43494" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/46598" }, { "type": "WEB", "url": "http://www.seil.jp/support/security/a01001.html" } ], "database_specific": { "cwe_ids": [ "CWE-119" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-03-01T23:00:00Z" } }