Логотип exploitDog
bind:CVE-2024-25004
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-25004

Количество 2

Количество 2

nvd логотип

CVE-2024-25004

почти 2 года назад

KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the username, occurs due to insufficient bounds checking and input sanitization (at line 2600). This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-ffgq-5r6g-59g7

почти 2 года назад

KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the username, occurs due to insufficient bounds checking and input sanitization (at line 2600). This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-25004

KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the username, occurs due to insufficient bounds checking and input sanitization (at line 2600). This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
github логотип
GHSA-ffgq-5r6g-59g7

KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the username, occurs due to insufficient bounds checking and input sanitization (at line 2600). This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.

CVSS3: 7.8
0%
Низкий
почти 2 года назад

Уязвимостей на страницу