PuTTY 0.66

CPE Details

PuTTY 0.66
0.66
2017-01-24
14h30 +00:00
2019-03-21
16h04 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:simon_tatham:putty:0.66:*:*:*:*:*:*:*

Informations

Vendor

simon_tatham

Product

putty

Version

0.66

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2016-2563 2016-04-07 21h00 +00:00 Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request.
9.8
Critical