Buffer Overflow vulnerability in eza before version 0.18.2, allows local attackers to execute arbitrary code via the .git/HEAD, .git/refs, and .git/objects components.
References
Configurations
No configuration.
History
08 Aug 2024, 21:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.4 |
CWE | CWE-120 |
06 Mar 2024, 15:18
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
06 Mar 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-06 00:15
Updated : 2024-08-08 21:35
NVD link : CVE-2024-25817
Mitre link : CVE-2024-25817
CVE.ORG link : CVE-2024-25817
JSON object : View
Products Affected
No product.
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')