Vulnerabilities
Vulnerable Software
Blade-Group:  >> Shadow  >> 2.13.3  Security Vulnerabilities
The network protocol of Blade Shadow though 2.13.3 allows remote attackers to take control of a Shadow instance and execute arbitrary code by only knowing the victim's IP address, because packet data can be injected into the unencrypted UDP packet stream.
CVSS Score
8.1
EPSS Score
0.024
Published
2019-11-14


Contact Us

Shodan ® - All rights reserved