Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8vrv-2fm5-wpvr

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.8

Описание

A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets, aka 'Windows TCP/IP Remote Code Execution Vulnerability'.

A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets, aka 'Windows TCP/IP Remote Code Execution Vulnerability'.

EPSS

Процентиль: 97%
0.30684
Средний

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
почти 5 лет назад

<p>A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could gain the ability to execute code on the target server or client.</p> <p>To exploit this vulnerability, an attacker would have to send specially crafted ICMPv6 Router Advertisement packets to a remote Windows computer.</p> <p>The update addresses the vulnerability by correcting how the Windows TCP/IP stack handles ICMPv6 Router Advertisement packets.</p>

CVSS3: 8.8
msrc
почти 5 лет назад

Windows TCP/IP Remote Code Execution Vulnerability

CVSS3: 9.8
fstec
почти 5 лет назад

Уязвимость реализации стека протоколов TCP/IP операционной системы Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 97%
0.30684
Средний

8.8 High

CVSS3