CTFs are fun, but what about exploiting a real bug?# Targets
pupnp [release-1.6.18](https://github.com/pupnp/pupnp/tree/release-1.6.18) ...
* ... running on [i386 Ubuntu 16.04](i386-xenial).
# Fix
commit [9c099c2923ab](https://github.com/pupnp/pupnp/commit/9c099c2923ab)
("Fix out-of-bound access in create_url_list() (CVE-2016-8863)").
[4.0K] /data/pocs/a75891b0ca7d42a7f41f3af449d9525a25cd3ce6
├── [4.0K] i386-xenial
│ ├── [ 92] build
│ ├── [4.4K] exploit
│ ├── [4.0K] image
│ │ └── [1.5K] Dockerfile
│ └── [ 332] run
├── [4.0K] pupnp
└── [ 290] README.md
3 directories, 5 files