TopVuln

High-risk vulnerability digests

CVE-2026-42483

  • CRITICAL

Details

CVSS v3
9.8
NVD published
2026-05-01 14:16:22
Affected versions
cpe:2.3:a:hashcat:hashcat:7.1.2:*:*:*:*:*:*:*
Summary
A heap-based buffer overflow in the Kerberos hash parser in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted Kerberos hash file. The issue affects module_hash_decode in multiple Kerberos-related modules because account_info_len is calculated from untrusted delimiter positions without upper-bound validation before memcpy copies the data into a fixed-size account_info buffer.
Remediation
Not available in our cache.
Exploit info
https://gist.github.com/sgInnora/107f2eb20367e47d58c911e38d56a91f

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.