CVE-2024-25254

SuperScan v4.1 was discovered to contain a buffer overflow via the Hostname/IP parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mcafee:superscan:4.1:*:*:*:*:*:*:*

History

24 Jun 2025, 15:32

Type Values Removed Values Added
CPE cpe:2.3:a:mcafee:superscan:4.1:*:*:*:*:*:*:*
First Time Mcafee
Mcafee superscan
References () https://exploitart.ist/exploit/2023/09/18/superscan-os-command-injection.html - () https://exploitart.ist/exploit/2023/09/18/superscan-os-command-injection.html - Broken Link

19 Nov 2024, 19:35

Type Values Removed Values Added
CWE CWE-120
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

12 Nov 2024, 13:55

Type Values Removed Values Added
Summary
  • (es) Se descubrió que SuperScan v4.1 contenía un desbordamiento de búfer a través del parámetro Nombre de host/IP.

11 Nov 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-11 23:15

Updated : 2025-06-24 15:32


NVD link : CVE-2024-25254

Mitre link : CVE-2024-25254

CVE.ORG link : CVE-2024-25254


JSON object : View

Products Affected

mcafee

  • superscan
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')