Filtered by vendor Dest-unreach
Subscriptions
Filtered by product Socat
Subscriptions
Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-54661 | 1 Dest-unreach | 1 Socat | 2024-12-04 | 9.8 Critical |
readline.sh in socat through 1.8.0.1 relies on the /tmp/$USER/stderr2 file. | ||||
CVE-2016-2217 | 1 Dest-unreach | 1 Socat | 2024-11-21 | N/A |
The OpenSSL address implementation in Socat 1.7.3.0 and 2.0.0-b8 does not use a prime number for the DH, which makes it easier for remote attackers to obtain the shared secret. | ||||
CVE-2015-1379 | 1 Dest-unreach | 1 Socat | 2024-11-21 | N/A |
The signal handler implementations in socat before 1.7.3.0 and 2.0.0-b8 allow remote attackers to cause a denial of service (process freeze or crash). | ||||
CVE-2014-0019 | 3 Dest-unreach, Fedoraproject, Opensuse | 3 Socat, Fedora, Opensuse | 2024-11-21 | N/A |
Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line. | ||||
CVE-2013-3571 | 1 Dest-unreach | 1 Socat | 2024-11-21 | N/A |
socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions. | ||||
CVE-2012-0219 | 1 Dest-unreach | 1 Socat | 2024-11-21 | N/A |
Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address. | ||||
CVE-2010-2799 | 1 Dest-unreach | 1 Socat | 2024-11-21 | N/A |
Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments. |
Page 1 of 1.