Search Results (Refine Search)
- CPE Product Version: cpe:/a:simon_tatham:putty:0.63
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2016-2563 |
Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request. Published: April 07, 2016; 7:59:07 PM -0400 |
V3.0: 9.8 CRITICAL V2.0: 7.5 HIGH |
CVE-2015-5309 |
Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow. Published: December 07, 2015; 3:59:08 PM -0500 |
V3.x:(not available) V2.0: 4.3 MEDIUM |