Filtered by vendor Libupnp Project
Subscribe
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-13848 | 2 Debian, Libupnp Project | 2 Debian Linux, Libupnp | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Portable UPnP SDK (aka libupnp) 1.12.1 and earlier allows remote attackers to cause a denial of service (crash) via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c. | |||||
CVE-2016-8863 | 2 Debian, Libupnp Project | 2 Debian Linux, Libupnp | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Heap-based buffer overflow in the create_url_list function in gena/gena_device.c in Portable UPnP SDK (aka libupnp) before 1.6.21 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a valid URI followed by an invalid one in the CALLBACK header of an SUBSCRIBE request. | |||||
CVE-2016-6255 | 2 Debian, Libupnp Project | 2 Debian Linux, Libupnp | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Portable UPnP SDK (aka libupnp) before 1.6.21 allows remote attackers to write to arbitrary files in the webroot via a POST request without a registered handler. | |||||
CVE-2012-5961 | 1 Libupnp Project | 1 Libupnp | 2024-11-21 | 10.0 HIGH | N/A |
Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) 1.3.1 allows remote attackers to execute arbitrary code via a long UDN (aka device) field in a UDP packet. | |||||
CVE-2012-5958 | 1 Libupnp Project | 1 Libupnp | 2024-11-21 | 10.0 HIGH | N/A |
Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a UDP packet with a crafted string that is not properly handled after a certain pointer subtraction. |