Page 2 of 9 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in the ncurses crate through 5.99.0 for Rust. There are format string issues in printw functions because C format arguments are mishandled. Se descubrió un problema en el paquete ncurses hasta la versión 5.99.0 para Rust. Hay problemas de cadena de formato en las funciones de printw porque los argumentos de formato C se manejan mal. • https://rustsec.org/advisories/RUSTSEC-2019-0006.html • CWE-134: Use of Externally-Controlled Format String •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in the ncurses crate through 5.99.0 for Rust. There are instr and mvwinstr buffer overflows because interaction with C functions is mishandled. Se descubrió un problema en el paquete ncurses hasta la versión 5.99.0 para Rust. Hay desbordamientos de búfer instr y mvwinstr porque la interacción con las funciones de C se maneja mal. • https://rustsec.org/advisories/RUSTSEC-2019-0006.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.2EPSS: 0%CPEs: 28EXPL: 0

Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling." El desbordamiento del búfer en ncurses 5.0, y el paquete de compatibilidad ncurses4 basado en él, permite a usuarios locales la obtención de privilegios. • http://www.debian.org/security/2002/dsa-113 http://www.iss.net/security_center/static/8222.php http://www.redhat.com/support/errata/RHSA-2002-020.html http://www.securityfocus.com/bid/2116 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.2EPSS: 0%CPEs: 13EXPL: 1

Buffer overflow in ncurses library allows local users to execute arbitrary commands via long environmental information such as TERM or TERMINFO_DIRS. • http://www.calderasystems.com/support/security/advisories/CSSA-2000-036.0.txt http://www.securityfocus.com/archive/1/138550 http://www.securityfocus.com/bid/1142 https://exchange.xforce.ibmcloud.com/vulnerabilities/44487 •