Nmap : Security Vulnerabilities, CVEs,
An issue was discovered in Npcap 0.992. Sending a malformed .pcap file with the loopback adapter using either pcap_sendqueue_queue() or pcap_sendqueue_transmit() results in kernel pool corruption. This could lead to arbitrary code executing inside the Windows kernel and allow escalation of privileges.
Max CVSS
7.8
EPSS Score
0.05%
Published
2019-04-24
Updated
2019-04-29
nmap version 6.49BETA6 through 7.60, up to and including SVN revision 37147 contains a Directory Traversal vulnerability in NSE script http-fetch that can result in file overwrite as the user is running it. This attack appears to be exploitable via a victim that runs NSE script http-fetch against a malicious web site. This vulnerability appears to have been fixed in 7.7.
Max CVSS
5.7
EPSS Score
0.06%
Published
2018-04-18
Updated
2018-05-24
Nmap through 7.70, when the -sV option is used, allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted TCP-based service.
Max CVSS
7.5
EPSS Score
2.28%
Published
2018-08-08
Updated
2020-08-27
nse_libssh2.cc in Nmap 7.70 is subject to a denial of service condition due to a double free when an SSH connection fails, as demonstrated by a leading \n character to ssh-brute.nse or ssh-auth-methods.nse.
Max CVSS
7.5
EPSS Score
0.41%
Published
2019-08-29
Updated
2019-09-26
The http-domino-enum-passwords.nse script in NMap before 6.40, when domino-enum-passwords.idpath is set, allows remote servers to upload "arbitrarily named" files via a crafted FullName parameter in a response, as demonstrated using directory traversal sequences.
Max CVSS
6.8
EPSS Score
3.09%
Published
2013-10-26
Updated
2018-10-30
5 vulnerabilities found