18 results (0.003 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

egg-compile.scm in CHICKEN 5.x before 5.3.1 allows arbitrary OS command execution during package installation via escape characters in a .egg file. egg-compile.scm en CHICKEN 5.x anterior a 5.3.1 permite la ejecución arbitraria de comandos del Sistema Operativo durante la instalación del paquete mediante caracteres de escape en un archivo .egg. • https://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git%3Ba=blobdiff%3Bf=NEWS%3Bh=54888afff09353093453673c407cabfe76a5ce77%3Bhp=a3fd88a892f82c8353267f50509d018bbb1934b9%3Bhb=670478435a982fc4d1f001ea08669f53d35a51cd%3Bhpb=a08f8f548d772ef410c672ba33a27108d8d434f3 https://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git%3Ba=blobdiff%3Bf=egg-compile.scm%3Bh=9ba4568113350ec75204cba55e43e27925e2d6fe%3Bhp=c1f2ceb0fb470f63c2ba2a1cf9d8d40083c2359f%3Bhb=a08f8f548d772ef410c672ba33a27108d8d434f3%3Bhpb=9c6fb001c25de4390f46ffd7c3c94237f4df92a9 https://lists.gnu.org/archive/html/chicken-announce/2022-11/msg0 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 3%CPEs: 5EXPL: 0

Buffer overflow in CHICKEN 4.9.0 and 4.9.0.1 may allow remote attackers to execute arbitrary code via the 'select' function. Un desbordamiento de búfer en CHICKEN versiones 4.9.0 y 4.9.0.1, puede permitir a atacantes remotos ejecutar código arbitrario por medio de la función "select". • http://www.openwall.com/lists/oss-security/2014/09/11/6 http://www.securityfocus.com/bid/69727 https://lists.nongnu.org/archive/html/chicken-users/2014-08/msg00055.html https://security-tracker.debian.org/tracker/CVE-2014-6310 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Chicken before 4.8.0 is susceptible to algorithmic complexity attacks related to hash table collisions. Chicken versiones anteriores a 4.8.0, es susceptible a ataques de complejidad algorítmica relacionados con colisiones de tablas hash. • http://www.openwall.com/lists/oss-security/2013/02/08/2 https://access.redhat.com/security/cve/cve-2012-6125 https://lists.nongnu.org/archive/html/chicken-hackers/2012-01/msg00002.html https://lists.nongnu.org/archive/html/chicken-hackers/2012-01/msg00020.html https://security-tracker.debian.org/tracker/CVE-2012-6125 • CWE-20: Improper Input Validation •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

A casting error in Chicken before 4.8.0 on 64-bit platform caused the random number generator to return a constant value. NOTE: the vendor states "This function wasn't used for security purposes (and is advertised as being unsuitable)." Un error de conversión en Chicken versiones anteriores a 4.8.0, en la plataforma de 64 bits causó que el generador de números aleatorios devolviera un valor constante. NOTA: el proveedor declara "This function wasn't used for security purposes (and is advertised as being unsuitable)." • http://www.openwall.com/lists/oss-security/2013/02/08/2 https://access.redhat.com/security/cve/cve-2012-6124 https://lists.nongnu.org/archive/html/chicken-hackers/2012-02/msg00084.html https://security-tracker.debian.org/tracker/CVE-2012-6124 • CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) •

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

Chicken before 4.8.0 does not properly handle NUL bytes in certain strings, which allows an attacker to conduct "poisoned NUL byte attack." Chicken versiones anteriores a 4.8.0, no maneja apropiadamente los bytes NUL en determinadas cadenas, lo que permite a un atacante conducir un "poisoned NUL byte attack." • http://www.openwall.com/lists/oss-security/2013/02/08/2 https://access.redhat.com/security/cve/cve-2012-6123 https://security-tracker.debian.org/tracker/CVE-2012-6123 • CWE-20: Improper Input Validation •