9bis

Kitty

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.26%
  • Veröffentlicht 09.02.2024 08:15:08
  • Zuletzt bearbeitet 15.05.2025 20:15:44

KiTTY versions 0.76.1.13 and before is vulnerable to command injection via the filename variable, occurs due to insufficient input sanitization and validation, failure to escape special characters, and insecure system calls (at lines 2369-2390). This...

Exploit
  • EPSS 0.55%
  • Veröffentlicht 09.02.2024 07:16:00
  • Zuletzt bearbeitet 08.05.2025 19:16:00

KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the hostname, occurs due to insufficient bounds checking and input sanitization. This allows an attacker to overwrite adjacent memory, which leads to arbitrary cod...

Exploit
  • EPSS 0.45%
  • Veröffentlicht 09.02.2024 07:16:00
  • Zuletzt bearbeitet 15.05.2025 20:15:48

KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the username, occurs due to insufficient bounds checking and input sanitization (at line 2600). This allows an attacker to overwrite adjacent memory, which leads t...

Medienbericht Exploit
  • EPSS 64.06%
  • Veröffentlicht 18.12.2023 16:15:10
  • Zuletzt bearbeitet 29.09.2025 21:56:10

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client a...

  • EPSS 28.64%
  • Veröffentlicht 07.04.2016 23:59:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size re...