Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-0230

Опубликовано: 31 янв. 2013
Источник: debian
EPSS Средний

Описание

Stack-based buffer overflow in the ExecuteSoapAction function in the SOAPAction handler in the HTTP service in MiniUPnP MiniUPnPd 1.0 allows remote attackers to execute arbitrary code via a long quoted method.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
miniupnpdnot-affectedpackage

EPSS

Процентиль: 98%
0.65612
Средний

Связанные уязвимости

ubuntu
около 13 лет назад

Stack-based buffer overflow in the ExecuteSoapAction function in the SOAPAction handler in the HTTP service in MiniUPnP MiniUPnPd 1.0 allows remote attackers to execute arbitrary code via a long quoted method.

nvd
около 13 лет назад

Stack-based buffer overflow in the ExecuteSoapAction function in the SOAPAction handler in the HTTP service in MiniUPnP MiniUPnPd 1.0 allows remote attackers to execute arbitrary code via a long quoted method.

github
почти 4 года назад

Stack-based buffer overflow in the ExecuteSoapAction function in the SOAPAction handler in the HTTP service in MiniUPnP MiniUPnPd 1.0 allows remote attackers to execute arbitrary code via a long quoted method.

EPSS

Процентиль: 98%
0.65612
Средний