Vulnerabilities > Simon Tatham > Putty > 0.65

DATE CVE VULNERABILITY TITLE RISK
2016-04-07 CVE-2016-2563 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request.
network
low complexity
9bis simon-tatham CWE-119
7.5
2015-12-07 CVE-2015-5309 Numeric Errors vulnerability in multiple products
Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.
4.3