mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 01:31:01 +00:00
42 lines
1.9 KiB
Markdown
42 lines
1.9 KiB
Markdown
### [CVE-2019-17424](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17424)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
A stack-based buffer overflow in the processPrivilage() function in IOS/process-general.c in nipper-ng 0.11.10 allows remote attackers (serving firewall configuration files) to achieve Remote Code Execution or Denial Of Service via a crafted file.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://packetstormsecurity.com/files/155378/nipper-ng-0.11.10-Remote-Buffer-Overflow.html
|
|
- http://packetstormsecurity.com/files/155378/nipper-ng-0.11.10-Remote-Buffer-Overflow.html
|
|
|
|
#### Github
|
|
- https://github.com/0xT11/CVE-POC
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/CnHack3r/Penetration_PoC
|
|
- https://github.com/EchoGin404/-
|
|
- https://github.com/EchoGin404/gongkaishouji
|
|
- https://github.com/Mr-xn/Penetration_Testing_POC
|
|
- https://github.com/Tyro-Shan/gongkaishouji
|
|
- https://github.com/YIXINSHUWU/Penetration_Testing_POC
|
|
- https://github.com/ZTK-009/Penetration_PoC
|
|
- https://github.com/alphaSeclab/sec-daily-2019
|
|
- https://github.com/developer3000S/PoC-in-GitHub
|
|
- https://github.com/guywhataguy/CVE-2019-17424
|
|
- https://github.com/hasee2018/Penetration_Testing_POC
|
|
- https://github.com/hectorgie/PoC-in-GitHub
|
|
- https://github.com/huike007/penetration_poc
|
|
- https://github.com/huike007/poc
|
|
- https://github.com/lions2012/Penetration_Testing_POC
|
|
- https://github.com/mavlevin/CVE-2019-17424
|
|
- https://github.com/password520/Penetration_PoC
|
|
- https://github.com/sereok3/buffer-overflow-writeups
|
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
|
- https://github.com/yedada-wei/-
|
|
- https://github.com/yedada-wei/gongkaishouji
|
|
|