Putty 0.65

CPE Details

Putty 0.65
0.65
2015-12-08
18h22 +00:00
2019-03-21
16h04 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:simon_tatham:putty:0.65:*:*:*:*:*:*:*

Informations

Vendor

simon_tatham

Product

putty

Version

0.65

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2016-2563 2016-04-07 21h00 +00:00 Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request.
9.8
Critical
CVE-2015-5309 2015-12-07 19h00 +00:00 Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.
4.3