[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:1601362
Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.

oval:org.secpod.oval:def:104991
Socat is a relay for bidirectional data transfer between two independent data channels. Each of these data channels may be a file, pipe, device , a socket , an SSL socket, proxy CONNECT connection, a file descriptor , the GNU line editor , a program, or a combination of two of these. The compat-read ...

oval:org.secpod.oval:def:103857
Socat is a relay for bidirectional data transfer between two independent data channels. Each of these data channels may be a file, pipe, device , a socket , an SSL socket, proxy CONNECT connection, a file descriptor , the GNU line editor , a program, or a combination of two of these. The compat-read ...

oval:org.secpod.oval:def:1300198
Multiple vulnerabilities has been discovered and corrected in socat: A heap based buffer overflow vulnerability has been found with data that happens to be output on the READLINE address. Successful exploitation may allow an attacker to execute arbitrary code with the privileges of the socat process ...

oval:org.secpod.oval:def:103841
Socat is a relay for bidirectional data transfer between two independent data channels. Each of these data channels may be a file, pipe, device , a socket , an SSL socket, proxy CONNECT connection, a file descriptor , the GNU line editor , a program, or a combination of two of these. The compat-read ...

CPE    21
cpe:/a:dest-unreach:socat:1.4.0.0
cpe:/a:dest-unreach:socat:1.4.0.1
cpe:/a:dest-unreach:socat:1.4.1.0
cpe:/a:dest-unreach:socat:1.4.3.1
...
CWE    1
CWE-119
*CVE
CVE-2012-0219

© SecPod Technologies