Type | URI |
---|---|
cve@mitre.org | http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html |
cve@mitre.org | https://blog.defcesco.io/CVE-2024-23749 |
Exploit | http://seclists.org/fulldisclosure/2024/Feb/13 |
Exploit | http://seclists.org/fulldisclosure/2024/Feb/14 |
CPE URI | Source package | Min version | Max version |
---|---|---|---|
cpe:2.3:a:9bis:kitty:*:*:*:*:*:windows:*:* |
kitty | >= None | <= 0.76.1.13 |
Source package | Branch | Version | Maintainer | Status |
---|---|---|---|---|
kitty | 3.19-community | 0.31.0-r4 | Francesco Colista <fcolista@alpinelinux.org> | possibly vulnerable |
kitty | 3.20-community | 0.31.0-r7 | Francesco Colista <fcolista@alpinelinux.org> | possibly vulnerable |
kitty | edge-community | 0.37.0-r0 | Francesco Colista <fcolista@alpinelinux.org> | possibly vulnerable |