Page 3 of 13 results (0.003 seconds)

CVSS: 10.0EPSS: 85%CPEs: 1EXPL: 3

Stack-based buffer overflow in the ExecuteSoapAction function in the SOAPAction handler in the HTTP service in MiniUPnP MiniUPnPd 1.0 allows remote attackers to execute arbitrary code via a long quoted method. Desbordamiento de búfer basado en pila en la función ExecuteSoapAction en el manejador SOAPAction en el servicio HTTP en MiniIPnP MiniIPnPd v1.0 permite a atacantes remotos ejecutar código de su elección a través de un método de gran longitud entre comillas. • https://www.exploit-db.com/exploits/37517 https://www.exploit-db.com/exploits/25975 https://www.exploit-db.com/exploits/36839 http://www.securityfocus.com/bid/57608 https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play https://community.rapid7.com/servlet/JiveServlet/download/2150-1-16596/SecurityFlawsUPnP.pdf https://community.rapid7.com/servlet/servlet.FileDownload?file=00P1400000cCaFb - • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

The ExecuteSoapAction function in the SOAPAction handler in the HTTP service in MiniUPnP MiniUPnPd 1.0 allows remote attackers to cause a denial of service (NULL pointer dereference and service crash) via a SOAPAction header that lacks a # (pound sign) character, a different vulnerability than CVE-2013-0230. La función ExecuteSoapAction en el manejador SOAPAction handler en el servicio HTTP en MiniUPnP MiniUPnPd v1.0 permite a atacantes remotos causar una denegación de servicio (referencia a puntero NULL y caída del servicio) mediante una cabecera SOAPAction que carece de un carácter #, una vulnerabilidad diferente de CVE-2013-0230. • https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play https://community.rapid7.com/servlet/JiveServlet/download/2150-1-16596/SecurityFlawsUPnP.pdf https://community.rapid7.com/servlet/servlet.FileDownload?file=00P1400000cCaFb •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Integer signedness error in the ExecuteSoapAction function in the SOAPAction handler in the HTTP service in MiniUPnP MiniUPnPd 1.0 allows remote attackers to cause a denial of service (incorrect memory copy) via a SOAPAction header that lacks a " (double quote) character, a different vulnerability than CVE-2013-0230. Error de signo de entero en la función ExecuteSoapAction en el manejador SOAPAction en el servicio HTTP en MiniUPnP MiniUPnPd v1.0, permite a atacantes remotos provocar una denegación de servicio (copia incorrecta de memoria) a través de una cabecera SOAPAction que aprovecha un carácter " (doble comilla). Vulnerabilidad distinta de CVE-2013-0230. • https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play https://community.rapid7.com/servlet/JiveServlet/download/2150-1-16596/SecurityFlawsUPnP.pdf https://community.rapid7.com/servlet/servlet.FileDownload?file=00P1400000cCaFb • CWE-189: Numeric Errors •