Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9794-w9r7-gpfh

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Windows 2000 and Windows XP Service Pack 1 allows remote attackers to execute arbitrary code via a crafted packet, and local users to gain privileges via a malicious application, as exploited by the Zotob (aka Mytob) worm.

Stack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Windows 2000 and Windows XP Service Pack 1 allows remote attackers to execute arbitrary code via a crafted packet, and local users to gain privileges via a malicious application, as exploited by the Zotob (aka Mytob) worm.

EPSS

Процентиль: 99%
0.87815
Высокий

Связанные уязвимости

nvd
больше 20 лет назад

Stack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Windows 2000 and Windows XP Service Pack 1 allows remote attackers to execute arbitrary code via a crafted packet, and local users to gain privileges via a malicious application, as exploited by the Zotob (aka Mytob) worm.

EPSS

Процентиль: 99%
0.87815
Высокий