vendor:
Windows
by:
Anonymous
7.8
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Windows
Affected Version From: Windows 2000
Affected Version To: Windows 10
Patch Exists: YES
Related CWE: CVE-2020-1234
CPE: o:microsoft:windows
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=137254, https://www.infosecmatter.com/nessus-plugin-library/?id=135640, https://www.infosecmatter.com/nessus-plugin-library/?id=94362, https://www.infosecmatter.com/nessus-plugin-library/?id=139006, https://www.infosecmatter.com/nessus-plugin-library/?id=82619, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/admin/dcerpc/cve_2020_1472_zerologon, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/admin/dcerpc/cve_2021_1675_printnightmare, https://www.infosecmatter.com/nessus-plugin-library/?id=134367, https://www.infosecmatter.com/nessus-plugin-library/?id=124064, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/http/plex_unpickle_dict_rce
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2020
Win32 Bind Shellcode
This exploit is a buffer overflow vulnerability in the Windows operating system. It allows an attacker to execute arbitrary code on the target system by overflowing a buffer with malicious code. The exploit is triggered when a user visits a malicious website or opens a malicious file. The malicious code is then executed on the target system, allowing the attacker to gain access to the system.
Mitigation:
The best way to mitigate this vulnerability is to ensure that all systems are running the latest version of Windows and that all security patches are applied.