SuperScan v4.1 was discovered to contain a buffer overflow via the Hostname/IP parameter.
References
Link | Resource |
---|---|
https://exploitart.ist/exploit/2023/09/18/superscan-os-command-injection.html | Broken Link |
Configurations
History
24 Jun 2025, 15:32
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mcafee:superscan:4.1:*:*:*:*:*:*:* | |
First Time |
Mcafee
Mcafee superscan |
|
References | () https://exploitart.ist/exploit/2023/09/18/superscan-os-command-injection.html - Broken Link |
19 Nov 2024, 19:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
12 Nov 2024, 13:55
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
11 Nov 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-11 23:15
Updated : 2025-06-24 15:32
NVD link : CVE-2024-25254
Mitre link : CVE-2024-25254
CVE.ORG link : CVE-2024-25254
JSON object : View
Products Affected
mcafee
- superscan
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')