Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w2qj-h768-f5c9

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the Universal Plug and Play (UPnP) service in Microsoft Windows XP SP2 allows remote attackers on the same subnet to execute arbitrary code via crafted HTTP headers in request or notification messages, which trigger memory corruption.

Stack-based buffer overflow in the Universal Plug and Play (UPnP) service in Microsoft Windows XP SP2 allows remote attackers on the same subnet to execute arbitrary code via crafted HTTP headers in request or notification messages, which trigger memory corruption.

EPSS

Процентиль: 90%
0.05987
Низкий

Дефекты

CWE-119

Связанные уязвимости

nvd
почти 19 лет назад

Stack-based buffer overflow in the Universal Plug and Play (UPnP) service in Microsoft Windows XP SP2 allows remote attackers on the same subnet to execute arbitrary code via crafted HTTP headers in request or notification messages, which trigger memory corruption.

EPSS

Процентиль: 90%
0.05987
Низкий

Дефекты

CWE-119