Stack-based buffer overflow in SSDP parser allows remote code executio
Reporter | Title | Published | Views | Family All 49 |
---|---|---|---|---|
![]() | Portable SDK for UPnP Devices libupnp Root Device Service Name Stack Buffer Overflow (CVE-2012-5960) | 24 Feb 201300:00 | – | checkpoint_advisories |
![]() | Portable SDK for UPnP Root Device Buffer Overflow - Ver2 (CVE-2012-5960) | 25 Jun 201800:00 | – | checkpoint_advisories |
![]() | CVE-2012-5960 | 31 Jan 201321:00 | – | cvelist |
![]() | CVE-2012-5960 | 31 Jan 201321:55 | – | cve |
![]() | CVE-2012-5960 | 31 Jan 201321:55 | – | nvd |
![]() | Stack overflow | 31 Jan 201321:55 | – | prion |
![]() | CVE-2012-5960 | 31 Jan 201300:00 | – | ubuntucve |
![]() | GLSA-201403-06 : libupnp: Arbitrary code execution | 27 Mar 201400:00 | – | nessus |
![]() | Portable SDK for UPnP Devices (libupnp) < 1.6.18 Multiple Stack-based Buffer Overflows RCE | 1 Feb 201300:00 | – | nessus |
![]() | Debian DSA-2615-1 : libupnp4 - several vulnerabilities | 4 Feb 201300:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 9 | all | libupnp | 1:1.6.19+git20160116-1.2 | libupnp_1:1.6.19+git20160116-1.2_all.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo