A vulnerability in NetCat CMS allows an attacker to send a specially crafted http request that can be used to check whether a user exists in the system, which could be a basis for further attacks.
This issue affects NetCat CMS v. 6.4.0.24126.2 and possibly others.
Apply patch from vendor https://netcat.ru/ https://netcat.ru/] . Versions 6.4.0.24248 and on have the patch.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 23 Sep 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Netcat netcat Content Management System
|
|
| Weaknesses | CWE-203 | |
| CPEs | cpe:2.3:a:netcat:netcat_content_management_system:*:*:*:*:-:*:*:* | |
| Vendors & Products |
Netcat netcat Content Management System
|
|
| Metrics |
cvssV3_1
|
Thu, 19 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Netcat
Netcat netcat |
|
| CPEs | cpe:2.3:a:netcat:netcat:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Netcat
Netcat netcat |
|
| Metrics |
ssvc
|
Thu, 19 Sep 2024 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in NetCat CMS allows an attacker to send a specially crafted http request that can be used to check whether a user exists in the system, which could be a basis for further attacks. This issue affects NetCat CMS v. 6.4.0.24126.2 and possibly others. Apply patch from vendor https://netcat.ru/ https://netcat.ru/] . Versions 6.4.0.24248 and on have the patch. | |
| Title | Netcat CMS: user enumeration | |
| Weaknesses | CWE-204 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Kaspersky
Published: 2024-09-19T16:30:10.685Z
Updated: 2024-09-19T18:28:53.419Z
Reserved: 2024-09-10T12:27:44.134Z
Link: CVE-2024-8651
Updated: 2024-09-19T18:28:45.942Z
Status : Analyzed
Published: 2024-09-19T17:15:15.173
Modified: 2024-09-23T17:51:13.050
Link: CVE-2024-8651
No data.