Логотип exploitDog
bind:CVE-2024-25003
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-25003

Количество 2

Количество 2

nvd логотип

CVE-2024-25003

около 2 лет назад

KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the hostname, occurs due to insufficient bounds checking and input sanitization. This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-h4x2-65ch-xf43

почти 2 года назад

KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the hostname, occurs due to insufficient bounds checking and input sanitization. This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-25003

KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the hostname, occurs due to insufficient bounds checking and input sanitization. This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.

CVSS3: 7.8
1%
Низкий
около 2 лет назад
github логотип
GHSA-h4x2-65ch-xf43

KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the hostname, occurs due to insufficient bounds checking and input sanitization. This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.

CVSS3: 7.8
1%
Низкий
почти 2 года назад

Уязвимостей на страницу