Логотип exploitDog
bind:CVE-2025-15382
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-15382

Количество 3

Количество 3

nvd логотип

CVE-2025-15382

около 1 месяца назад

A heap buffer over-read vulnerability exists in the wolfSSH_CleanPath() function in wolfSSH. An authenticated remote attacker can trigger the issue via crafted SCP path input containing '/./' sequences, resulting in a heap over read by 1 byte.

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2025-15382

около 1 месяца назад

A heap buffer over-read vulnerability exists in the wolfSSH_CleanPath( ...

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-6mw8-c4j3-m9rv

около 1 месяца назад

A heap buffer over-read vulnerability exists in the wolfSSH_CleanPath() function in wolfSSH. An authenticated remote attacker can trigger the issue via crafted SCP path input containing '/./' sequences, resulting in a heap over read by 1 byte.

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-15382

A heap buffer over-read vulnerability exists in the wolfSSH_CleanPath() function in wolfSSH. An authenticated remote attacker can trigger the issue via crafted SCP path input containing '/./' sequences, resulting in a heap over read by 1 byte.

CVSS3: 8.1
0%
Низкий
около 1 месяца назад
debian логотип
CVE-2025-15382

A heap buffer over-read vulnerability exists in the wolfSSH_CleanPath( ...

CVSS3: 8.1
0%
Низкий
около 1 месяца назад
github логотип
GHSA-6mw8-c4j3-m9rv

A heap buffer over-read vulnerability exists in the wolfSSH_CleanPath() function in wolfSSH. An authenticated remote attacker can trigger the issue via crafted SCP path input containing '/./' sequences, resulting in a heap over read by 1 byte.

CVSS3: 8.1
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу