Логотип exploitDog
bind:CVE-2013-3878
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2013-3878

Количество 2

Количество 2

nvd логотип

CVE-2013-3878

около 12 лет назад

Stack-based buffer overflow in the LRPC client in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges by operating an LRPC server that sends a crafted LPC port message, aka "LRPC Client Buffer Overrun Vulnerability."

CVSS2: 6.9
EPSS: Низкий
github логотип

GHSA-p6hw-f2g5-926g

больше 3 лет назад

Stack-based buffer overflow in the LRPC client in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges by operating an LRPC server that sends a crafted LPC port message, aka "LRPC Client Buffer Overrun Vulnerability."

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2013-3878

Stack-based buffer overflow in the LRPC client in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges by operating an LRPC server that sends a crafted LPC port message, aka "LRPC Client Buffer Overrun Vulnerability."

CVSS2: 6.9
1%
Низкий
около 12 лет назад
github логотип
GHSA-p6hw-f2g5-926g

Stack-based buffer overflow in the LRPC client in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges by operating an LRPC server that sends a crafted LPC port message, aka "LRPC Client Buffer Overrun Vulnerability."

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу