CVE-2019-16724

File Sharing Wizard 1.5.0 allows a remote attacker to obtain arbitrary code execution by exploiting a Structured Exception Handler (SEH) based buffer overflow in an HTTP POST parameter, a similar issue to CVE-2010-2330 and CVE-2010-2331.
Configurations

Configuration 1 (hide)

cpe:2.3:a:upredsun:file_sharing_wizard:1.5.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:31

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/154586/File-Sharing-Wizard-1.5.0-SEH-Buffer-Overflow.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/154586/File-Sharing-Wizard-1.5.0-SEH-Buffer-Overflow.html - Exploit, Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/154777/File-Sharing-Wizard-1.5.0-POST-SEH-Overflow.html - () http://packetstormsecurity.com/files/154777/File-Sharing-Wizard-1.5.0-POST-SEH-Overflow.html -
References () https://www.exploit-db.com/exploits/47412 - () https://www.exploit-db.com/exploits/47412 -

Information

Published : 2019-09-24 21:15

Updated : 2024-11-21 04:31


NVD link : CVE-2019-16724

Mitre link : CVE-2019-16724

CVE.ORG link : CVE-2019-16724


JSON object : View

Products Affected

upredsun

  • file_sharing_wizard
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')