CVE-2024-54661
- EPSS 0.22%
- Veröffentlicht 04.12.2024 05:15:07
- Zuletzt bearbeitet 15.04.2026 00:35:42
readline.sh in socat before1.8.0.2 relies on the /tmp/$USER/stderr2 file.
CVE-2015-1379
- EPSS 2.26%
- Veröffentlicht 08.06.2017 21:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
The signal handler implementations in socat before 1.7.3.0 and 2.0.0-b8 allow remote attackers to cause a denial of service (process freeze or crash).
CVE-2016-2217
- EPSS 0.35%
- Veröffentlicht 30.01.2017 22:59:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
The OpenSSL address implementation in Socat 1.7.3.0 and 2.0.0-b8 does not use a prime number for the DH, which makes it easier for remote attackers to obtain the shared secret.
CVE-2013-3571
- EPSS 0.54%
- Veröffentlicht 08.05.2014 14:29:08
- Zuletzt bearbeitet 06.05.2026 22:30:45
socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused ba...
CVE-2014-0019
- EPSS 0.09%
- Veröffentlicht 04.02.2014 21:55:05
- Zuletzt bearbeitet 29.04.2026 01:13:23
Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.
CVE-2012-0219
- EPSS 0.08%
- Veröffentlicht 21.06.2012 15:55:11
- Zuletzt bearbeitet 29.04.2026 01:13:23
Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.
CVE-2010-2799
- EPSS 1.35%
- Veröffentlicht 14.09.2010 21:00:01
- Zuletzt bearbeitet 29.04.2026 01:13:23
Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-l...