2 results (0.006 seconds)

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

ACON is a widely-used library of tools for machine learning that focuses on adaptive correlation optimization. A potential vulnerability has been identified in the input validation process, which could lead to arbitrary code execution if exploited. This issue could allow an attacker to submit malicious input data, bypassing input validation, resulting in remote code execution in certain machine learning applications using the ACON library. All users utilizing ACON’s input-handling functions are potentially at risk. Specifically, machine learning models or applications that ingest user-generated data without proper sanitization are the most vulnerable. • https://github.com/torinriley/ACON/security/advisories/GHSA-345g-6rmp-3cv9 • CWE-20: Improper Input Validation •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Multiple stack-based buffer overflows in (a) acon.c, (b) menu.c, and (c) child.c in Acon 1.0.5-5 through 1.0.5-7 allow local users to execute arbitrary code via (1) a long HOME environment variable or (2) a large number of terminal columns. Múltiples desbordamientos de búfer basados en la pila en (a) acon.c, (b) menu.c, y (c) child.c en Acon 1.0.5-5 a 1.0.5.7 permiten a usuarios locales ejecutar código de su elección mediante (1) una variable de entorno HOME larga, o (2) un gran número de columnas de terminal. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=475733 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476603 http://secunia.com/advisories/29909 http://www.securityfocus.com/bid/28862 https://exchange.xforce.ibmcloud.com/vulnerabilities/41915 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •