[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-33642":6},{"stargazers_count":4,"fetched_at":5},6,"2026-05-19T22:43:29.387Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":40,"aliases":41,"duplicate_of":9,"upstream":42,"downstream":43,"duplicates":44,"related":45,"reserved_at":9,"published_at":46,"modified_at":47,"state":48,"summary":49,"references_raw":56,"kevs":68,"epss":9,"epss_history":69,"metrics":70,"affected":78},"CVE-2026-33642","Kitty is a cross-platform GPU based terminal. In versions 0.46.2 and below, the handle_compose_command() function in kitty/graphics.c performs bounds validation on composition offsets using unsigned 32-bit arithmetic that is subject to integer wrapping, potentially leading to Heap Buffer Over-Read/Write. An attacker who can write escape sequences to a kitty terminal (e.g., via a malicious file, SSH login banner, or piped content) can supply crafted x_offset/y_offset values that pass the bounds check after wrapping but cause massive out-of-bounds heap memory access in compose_rectangles(). No user interaction is required. No non-default configuration is required. The attacker only needs the ability to produce output in a kitty terminal window. This issue has been fixed in version 0.47.0.",null,[11,23,34],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":9,"capec":18},"CWE-125","Out-of-bounds Read","The product reads data past the end, or before the beginning, of the intended buffer.","weakness","Draft","Base",[19],{"id":20,"name":21,"techniques":22},"CAPEC-540","Overread Buffers",[],{"_key":24,"id":24,"name":25,"description":26,"type":15,"status":27,"abstraction":17,"likelihood_of_exploit":28,"capec":29},"CWE-190","Integer Overflow or Wraparound","The product performs a calculation that can\n         produce an integer overflow or wraparound when the logic\n         assumes that the resulting value will always be larger than\n         the original value. This occurs when an integer value is\n         incremented to a value that is too large to store in the\n         associated representation. When this occurs, the value may\n         become a very small or negative number.","Stable","Medium",[30],{"id":31,"name":32,"techniques":33},"CAPEC-92","Forced Integer Overflow",[],{"_key":35,"id":35,"name":36,"description":37,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":38,"capec":39},"CWE-787","Out-of-bounds Write","The product writes data past the end, or before the beginning, of the intended buffer.","High",[],[],[],[],[],[],[],"2026-05-19T18:04:42.482Z","2026-05-19T19:13:23.671Z","Awaiting Analysis",{"cisa_kev":50,"cisa_ransomware":50,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":51,"severity_score":52,"severity_version":53,"severity_source":54,"severity_vector":55,"severity_status":48},false,"critical",9.9,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H",[57,63],{"url":58,"sources":59,"tags":61},"https://github.com/kovidgoyal/kitty/security/advisories/GHSA-qfgm-2c64-6x3x",[54,60],"nvd",[62],"X Refsource CONFIRM",{"url":64,"sources":65,"tags":66},"https://github.com/kovidgoyal/kitty/commit/e9661f0f3afb4e4dbffa509adfb3df3c9780ad34",[54,60],[67],"X Refsource MISC",[],[],[71,76],{"source":54,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":72,"cvss_v4_0":9},{"baseScore":52,"baseSeverity":73,"vectorString":55,"impactScore":74,"exploitabilityScore":75},"CRITICAL",8.8,10,{"source":60,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":77,"cvss_v4_0":9},{"baseScore":52,"baseSeverity":73,"vectorString":55,"impactScore":74,"exploitabilityScore":75},[79],{"ecosystem":9,"name":80,"vendor":81,"product":80,"cpe_part":82,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":83},"kitty","kovidgoyal","a",[84],{"version":85,"is_range":86,"range_type":54,"version_start":9,"version_start_type":9,"version_end":87,"version_end_type":88,"fixed_in":9},"\u003C 0.47.0",true,"0.47.0","excluding"]