TopVuln

High-risk vulnerability digests

CVE-2026-42482

  • CRITICAL

Details

CVSS v3
9.8
NVD published
2026-05-01 14:16:22
Affected versions
cpe:2.3:a:hashcat:hashcat:7.1.2:*:*:*:*:*:*:*
Summary
A stack-based buffer overflow in mangle_to_hex_lower() and mangle_to_hex_upper() in src/rp_cpu.c in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted rule file, or via the -j or -k rule options used with password candidates of 128 or more characters. The vulnerability is caused by a bounds check that fails to account for the 2x expansion that occurs when password bytes are converted to hexadecimal.
Remediation
Not available in our cache.
Exploit info
https://gist.github.com/sgInnora/107f2eb20367e47d58c911e38d56a91f

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.