readline.sh in socat through 1.8.0.1 relies on the /tmp/$USER/stderr2 file.
Metrics
Affected Vendors & Products
References
History
Thu, 05 Dec 2024 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | socat: From CVEorg collector | |
Weaknesses | CWE-377 | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Wed, 04 Dec 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dest-unreach
Dest-unreach socat |
|
CPEs | cpe:2.3:a:dest-unreach:socat:*:*:*:*:*:*:*:* | |
Vendors & Products |
Dest-unreach
Dest-unreach socat |
|
Metrics |
cvssV3_1
|
Wed, 04 Dec 2024 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | readline.sh in socat through 1.8.0.1 relies on the /tmp/$USER/stderr2 file. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-12-04T00:00:00
Updated: 2024-12-04T14:56:23.433Z
Reserved: 2024-12-04T00:00:00
Link: CVE-2024-54661
Vulnrichment
Updated: 2024-12-04T14:56:11.582Z
NVD
Status : Received
Published: 2024-12-04T05:15:07.967
Modified: 2024-12-04T15:15:17.580
Link: CVE-2024-54661
Redhat