{"uuid": "161f30c7-d7b3-4c4d-8f13-bf2695fa87ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25003", "type": "seen", "source": "https://t.me/arpsyndicate/3429", "content": "#ExploitObserverAlert\n\nCVE-2024-25003\n\nDESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-25003. KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the hostname, occurs due to insufficient bounds checking and input sanitization. This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.\n\nFIRST-EPSS: 0.000430000", "creation_timestamp": "2024-02-11T15:49:09.000000Z"}