CVE-2024-54661
- EPSS 0.27%
- Published 04.12.2024 05:15:07
- Last modified 07.01.2025 01:15:06
readline.sh in socat before1.8.0.2 relies on the /tmp/$USER/stderr2 file.
CVE-2015-1379
- EPSS 1.03%
- Published 08.06.2017 21:29:00
- Last modified 20.04.2025 01:37:25
The signal handler implementations in socat before 1.7.3.0 and 2.0.0-b8 allow remote attackers to cause a denial of service (process freeze or crash).
CVE-2016-2217
- EPSS 0.35%
- Published 30.01.2017 22:59:00
- Last modified 20.04.2025 01:37:25
The OpenSSL address implementation in Socat 1.7.3.0 and 2.0.0-b8 does not use a prime number for the DH, which makes it easier for remote attackers to obtain the shared secret.
CVE-2013-3571
- EPSS 0.82%
- Published 08.05.2014 14:29:08
- Last modified 12.04.2025 10:46:40
socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused ba...
CVE-2014-0019
- EPSS 0.09%
- Published 04.02.2014 21:55:05
- Last modified 11.04.2025 00:51:21
Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.
CVE-2012-0219
- EPSS 0.17%
- Published 21.06.2012 15:55:11
- Last modified 11.04.2025 00:51:21
Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.
CVE-2010-2799
- EPSS 1.42%
- Published 14.09.2010 21:00:01
- Last modified 11.04.2025 00:51:21
Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-l...