neurobin shc har 4.0.3 src/shc.c make Pufferüberlauf

Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin neurobin shc har 4.0.3. Gaskiya, make na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, src/shc.c na cikin fayil, $software_component na cikin sashi. Ngam manipulation shi Pufferüberlauf. CWE shidin ka a yi bayani matsala sai ya kai CWE-121. Gaskiya, laifi an fitar da shi 08/19/2025. Advisory ɗin ana rabawa don saukewa a magnificent-dill-351.notion.site. Wannan rauni ana sayar da shi da suna CVE-2025-9175. Wuroo ka a yiɗi a yi ɗum e gese. Tekinikal bayani ga. Kuma, exploit ɗin yana akwai. Wuro exploit ɗin an bayyana shi ga jama'a kuma za a iya amfani da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á wúro huɗɗi-na-gaskiya. Wona yiwuwa a zazzage exploit a magnificent-dill-351.notion.site. Kama 0-day, an ndiyam a wuro be $0-$5k. VulDB is the best source for vulnerability data and more expert information about this specific topic.

4 Goyarwa · 97 Datenpunkte

FurɗeSúgá
08/19/2025 16:05
Gargadi 1/3
08/20/2025 06:48
Gargadi 2/3
08/20/2025 12:37
Gargadi 3/3
09/11/2025 22:12
software_vendorneurobinneurobinneurobinneurobin
software_nameshcshcshcshc
software_version<=4.0.3<=4.0.3<=4.0.3<=4.0.3
software_filesrc/shc.csrc/shc.csrc/shc.csrc/shc.c
software_functionmakemakemakemake
vulnerability_cweCWE-121 (Pufferüberlauf)CWE-121 (Pufferüberlauf)CWE-121 (Pufferüberlauf)CWE-121 (Pufferüberlauf)
vulnerability_risk1111
cvss3_vuldb_avLLLL
cvss3_vuldb_acLLLL
cvss3_vuldb_prLLLL
cvss3_vuldb_uiNNNN
cvss3_vuldb_sUUUU
cvss3_vuldb_cLLLL
cvss3_vuldb_iLLLL
cvss3_vuldb_aLLLL
cvss3_vuldb_ePPPP
cvss3_vuldb_rcRRRR
advisory_urlhttps://magnificent-dill-351.notion.site/Stack-Overflow-in-shc-4-0-3-249c693918ed804b8c44ee11eb0af087https://magnificent-dill-351.notion.site/Stack-Overflow-in-shc-4-0-3-249c693918ed804b8c44ee11eb0af087https://magnificent-dill-351.notion.site/Stack-Overflow-in-shc-4-0-3-249c693918ed804b8c44ee11eb0af087https://magnificent-dill-351.notion.site/Stack-Overflow-in-shc-4-0-3-249c693918ed804b8c44ee11eb0af087
exploit_availability1111
exploit_publicity1111
exploit_urlhttps://magnificent-dill-351.notion.site/Stack-Overflow-in-shc-4-0-3-249c693918ed804b8c44ee11eb0af087https://magnificent-dill-351.notion.site/Stack-Overflow-in-shc-4-0-3-249c693918ed804b8c44ee11eb0af087https://magnificent-dill-351.notion.site/Stack-Overflow-in-shc-4-0-3-249c693918ed804b8c44ee11eb0af087https://magnificent-dill-351.notion.site/Stack-Overflow-in-shc-4-0-3-249c693918ed804b8c44ee11eb0af087
source_cveCVE-2025-9175CVE-2025-9175CVE-2025-9175CVE-2025-9175
cna_responsibleVulDBVulDBVulDBVulDB
cvss2_vuldb_avLLLL
cvss2_vuldb_acLLLL
cvss2_vuldb_ciPPPP
cvss2_vuldb_iiPPPP
cvss2_vuldb_aiPPPP
cvss2_vuldb_ePOCPOCPOCPOC
cvss2_vuldb_rcURURURUR
cvss4_vuldb_avLLLL
cvss4_vuldb_acLLLL
cvss4_vuldb_prLLLL
cvss4_vuldb_uiNNNN
cvss4_vuldb_vcLLLL
cvss4_vuldb_viLLLL
cvss4_vuldb_vaLLLL
cvss4_vuldb_ePPPP
cvss2_vuldb_auSSSS
cvss2_vuldb_rlNDNDNDND
cvss3_vuldb_rlXXXX
cvss4_vuldb_atNNNN
cvss4_vuldb_scNNNN
cvss4_vuldb_siNNNN
cvss4_vuldb_saNNNN
cvss2_vuldb_basescore4.34.34.34.3
cvss2_vuldb_tempscore3.73.73.73.7
cvss3_vuldb_basescore5.35.35.35.3
cvss3_vuldb_tempscore4.84.84.84.8
cvss3_meta_basescore5.35.35.36.1
cvss3_meta_tempscore4.85.05.06.0
cvss4_vuldb_bscore4.84.84.84.8
cvss4_vuldb_btscore1.91.91.91.9
advisory_date1755554400 (08/19/2025)1755554400 (08/19/2025)1755554400 (08/19/2025)1755554400 (08/19/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA vulnerability was identified in neurobin shc up to 4.0.3. This issue affects the function make of the file src/shc.c. The manipulation leads to stack-based buffer overflow. The attack can only be performed from a local environment. The exploit is publicly available and might be used.A vulnerability was identified in neurobin shc up to 4.0.3. This issue affects the function make of the file src/shc.c. The manipulation leads to stack-based buffer overflow. The attack can only be performed from a local environment. The exploit is publicly available and might be used.A vulnerability was identified in neurobin shc up to 4.0.3. This issue affects the function make of the file src/shc.c. The manipulation leads to stack-based buffer overflow. The attack can only be performed from a local environment. The exploit is publicly available and might be used.
cvss4_cna_avLLL
cvss4_cna_acLLL
cvss4_cna_atNNN
cvss4_cna_prLLL
cvss4_cna_uiNNN
cvss4_cna_vcLLL
cvss4_cna_viLLL
cvss4_cna_vaLLL
cvss4_cna_scNNN
cvss4_cna_siNNN
cvss4_cna_saNNN
cvss4_cna_bscore4.84.84.8
cvss3_cna_avLLL
cvss3_cna_acLLL
cvss3_cna_prLLL
cvss3_cna_uiNNN
cvss3_cna_sUUU
cvss3_cna_cLLL
cvss3_cna_iLLL
cvss3_cna_aLLL
cvss3_cna_basescore5.35.35.3
cvss2_cna_avLLL
cvss2_cna_acLLL
cvss2_cna_auSSS
cvss2_cna_ciPPP
cvss2_cna_iiPPP
cvss2_cna_aiPPP
cvss2_cna_basescore4.34.34.3
cve_nvd_summaryesSe identificó una vulnerabilidad en neurobin shc hasta la versión 4.0.3. Este problema afecta a la función make del archivo src/shc.c. La manipulación provoca un desbordamiento del búfer en la pila. El ataque solo puede ejecutarse desde un entorno local. Se ha hecho público el exploit y puede que sea utilizado.Se identificó una vulnerabilidad en neurobin shc hasta la versión 4.0.3. Este problema afecta a la función make del archivo src/shc.c. La manipulación provoca un desbordamiento del búfer en la pila. El ataque solo puede ejecutarse desde un entorno local. Se ha hecho público el exploit y puede que sea utilizado.
cvss3_nvd_avL
cvss3_nvd_acL
cvss3_nvd_prL
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_nvd_basescore7.8

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!