Skip navigation

Update your Netcat software for Windows

A unchecked buffer in the popular Netcat tool for Windows could allow remote code execution. The vulnerability, discovered by Hat Squad, can be exploited when using the netcat -e option. The -e option redirects data from an application launched by Netcat. If you use the tool you should probably upgrade soon. A new version  (v1.11) is available at the Vulnwatch Web site.

Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.