SuperScan v4.1 was discovered to contain a buffer overflow via the Hostname/IP parameter.
References
Link | Resource |
---|---|
https://exploitart.ist/exploit/2023/09/18/superscan-os-command-injection.html | Broken Link |
Configurations
History
24 Jun 2025, 15:32
Type | Values Removed | Values Added |
---|---|---|
First Time |
Mcafee superscan
Mcafee |
|
References | () https://exploitart.ist/exploit/2023/09/18/superscan-os-command-injection.html - Broken Link | |
CPE | cpe:2.3:a:mcafee:superscan:4.1:*:*:*:*:*:*:* |
19 Nov 2024, 19:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-120 |
12 Nov 2024, 13:55
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
11 Nov 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-11 23:15
Updated : 2025-06-24 15:32
NVD link : CVE-2024-25254
Mitre link : CVE-2024-25254
CVE.ORG link : CVE-2024-25254
JSON object : View
Products Affected
mcafee
- superscan
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')