Описание
In PuTTY versions before 0.71 on Windows, local attackers could hijack the application by putting a malicious help file in the same directory as the executable.
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Release NotesThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Release NotesThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.71 (исключая)
Одновременно
cpe:2.3:a:putty:putty:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Конфигурация 2
Одно из
cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
EPSS
Процентиль: 84%
0.0224
Низкий
7.8 High
CVSS3
4.6 Medium
CVSS2
Дефекты
CWE-427
Связанные уязвимости
CVSS3: 7.8
ubuntu
почти 7 лет назад
In PuTTY versions before 0.71 on Windows, local attackers could hijack the application by putting a malicious help file in the same directory as the executable.
CVSS3: 7.8
debian
почти 7 лет назад
In PuTTY versions before 0.71 on Windows, local attackers could hijack ...
CVSS3: 7.8
github
больше 3 лет назад
In PuTTY versions before 0.71 on Windows, local attackers could hijack the application by putting a malicious help file in the same directory as the executable.
EPSS
Процентиль: 84%
0.0224
Низкий
7.8 High
CVSS3
4.6 Medium
CVSS2
Дефекты
CWE-427