Page 2 of 11 results (0.010 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

Uninitialized stack variable vulnerability in NameValueParserEndElt (upnpreplyparse.c) in miniupnpd < 2.0 allows an attacker to cause Denial of Service (Segmentation fault and Memory Corruption) or possibly have unspecified other impact Vulnerabilidad de variable de pila no inicializada en NameValueParserEndElt (upnpreplyparse.c) en miniupnpd en versiones posteriores a la 2.0 permite que un atacante provoque una denegación de servicio (fallo de segmentación y corrupción de memoria) o que, posiblemente, cause otro tipo de impacto sin especificar. • https://github.com/miniupnp/miniupnp/commit/7aeb624b44f86d335841242ff427433190e7168a https://github.com/miniupnp/miniupnp/issues/268 https://lists.debian.org/debian-lts-announce/2019/05/msg00045.html https://usn.ubuntu.com/3562-1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 5%CPEs: 6EXPL: 2

Integer signedness error in MiniUPnP MiniUPnPc v1.4.20101221 through v2.0 allows remote attackers to cause a denial of service or possibly have unspecified other impact. Error de entero sin signo en MiniUPnP MiniUPnPc versiónes desde la 1.4.20101221 hasta la 2.0 permite a atacantes remotos causar una denegación de servicio o posiblemente tener otro impacto no especificado. miniupnpc suffers from an integer signedness error when parsing a chunked encoded http response. • https://www.exploit-db.com/exploits/43501 http://miniupnp.free.fr/files/changelog.php?file=miniupnpc-2.0.20170509.tar.gz https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-8798 https://lists.debian.org/debian-lts-announce/2020/04/msg00027.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 97%CPEs: 4EXPL: 2

The ProcessSSDPRequest function in minissdp.c in the SSDP handler in MiniUPnP MiniUPnPd before 1.4 allows remote attackers to cause a denial of service (service crash) via a crafted request that triggers a buffer over-read. La función ProcessSSDPRequest en minissdp.c en el manejador SSDP en MiniUPnP MiniUPnPd anterior a v1.4 permite a atacantes remotos causar una denegación de servicio (caída del servicio) mediante una petición falsificada que genera una sobre lectura del búfer. • https://www.exploit-db.com/exploits/37517 https://www.exploit-db.com/exploits/38249 https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play https://community.rapid7.com/servlet/JiveServlet/download/2150-1-16596/SecurityFlawsUPnP.pdf https://community.rapid7.com/servlet/servlet.FileDownload?file=00P1400000cCaFb - •

CVSS: 10.0EPSS: 85%CPEs: 1EXPL: 3

Stack-based buffer overflow in the ExecuteSoapAction function in the SOAPAction handler in the HTTP service in MiniUPnP MiniUPnPd 1.0 allows remote attackers to execute arbitrary code via a long quoted method. Desbordamiento de búfer basado en pila en la función ExecuteSoapAction en el manejador SOAPAction en el servicio HTTP en MiniIPnP MiniIPnPd v1.0 permite a atacantes remotos ejecutar código de su elección a través de un método de gran longitud entre comillas. • https://www.exploit-db.com/exploits/37517 https://www.exploit-db.com/exploits/25975 https://www.exploit-db.com/exploits/36839 http://www.securityfocus.com/bid/57608 https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play https://community.rapid7.com/servlet/JiveServlet/download/2150-1-16596/SecurityFlawsUPnP.pdf https://community.rapid7.com/servlet/servlet.FileDownload?file=00P1400000cCaFb - • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

The ExecuteSoapAction function in the SOAPAction handler in the HTTP service in MiniUPnP MiniUPnPd 1.0 allows remote attackers to cause a denial of service (NULL pointer dereference and service crash) via a SOAPAction header that lacks a # (pound sign) character, a different vulnerability than CVE-2013-0230. La función ExecuteSoapAction en el manejador SOAPAction handler en el servicio HTTP en MiniUPnP MiniUPnPd v1.0 permite a atacantes remotos causar una denegación de servicio (referencia a puntero NULL y caída del servicio) mediante una cabecera SOAPAction que carece de un carácter #, una vulnerabilidad diferente de CVE-2013-0230. • https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play https://community.rapid7.com/servlet/JiveServlet/download/2150-1-16596/SecurityFlawsUPnP.pdf https://community.rapid7.com/servlet/servlet.FileDownload?file=00P1400000cCaFb •