Page 35 of 1101 results (0.021 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

09 Sep 2019 — GNU cflow through 1.6 has a heap-based buffer over-read in the nexttoken function in parser.c. GNU cflow versiones hasta 1.6, presenta una lectura excesiva del búfer en la región heap de la memoria en la función nexttoken en el archivo parser.c. • https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg00000.html • CWE-125: Out-of-bounds Read •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

02 Sep 2019 — The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same. El backend POWER9 en GNU Compiler Collection (GCC) en versiones anteriores a la 10 podría optimizar múltiples llamadas de __buil... • http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html • CWE-331: Insufficient Entropy •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

29 Aug 2019 — In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file. En GNU Chess 6.2.5, hay un desbordamiento de búfer basado en pilas en la función cmd_load en frontend/cmd.cc a través de una posición de Chess diseñada en un archivo EPD. • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZA4UCVURQXNLUNFAMRLZBAFRHSEVC6Q • CWE-787: Out-of-bounds Write •

CVSS: 6.5EPSS: 0%CPEs: 6EXPL: 0

23 Aug 2019 — GNU Libextractor through 1.9 has a heap-based buffer over-read in the function EXTRACTOR_dvi_extract_method in plugins/dvi_extractor.c. GNU Libextractor hasta la versión 1.9 tiene una sobre-lectura de búfer basada en el montón en la función EXTRACTOR_dvi_extract_method en plugins / dvi_extractor.c. • https://bugs.gnunet.org/view.php?id=5846 • CWE-125: Out-of-bounds Read •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 2

16 Aug 2019 — do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter. La función do_ed_script en el archivo pch.c en el parche GNU versiones hasta 2.7.6 no bloquea cadenas que comienzan con un carácter !. • https://packetstorm.news/files/id/154124 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

14 Aug 2019 — handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header. la función handle_messages en el archivo eXtl_tls.c en eXosip versiones anteriores a 5.0.0, maneja inapropiadamente un valor negativo en un encabezado content-length. • http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070 • CWE-189: Numeric Errors •

CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 1

30 Jul 2019 — apply_relocations in readelf.c in GNU Binutils 2.32 contains an integer overflow that allows attackers to trigger a write access violation (in byte_put_little_endian function in elfcomm.c) via an ELF file, as demonstrated by readelf. La función apply_relocations en el archivo readelf.c en Binutils de GNU versión 2.32, contiene un desbordamiento de enteros que permite a los atacantes desencadenar una violación de acceso de escritura (en la función byte_put_little_endian en el archivo elfcomm.c) por medio de ... • http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 1

24 Jul 2019 — GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet. • http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-125: Out-of-bounds Read •

CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 2

24 Jul 2019 — An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow. Se ha descubierto una vulnerabilidad en GNU libiberty, tal y como se distribuye en GNU Binutils versión 2.32. simple_object_elf_match in simple-object-elf.c no comprueba un valor shstrndx de cero, lo que lleva a un desbordamiento de enteros y un desbordamiento de búfer b... • http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html • CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •

CVSS: 9.3EPSS: 4%CPEs: 4EXPL: 1

24 Jul 2019 — GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. RouterOS de Mikrotik anterior a versión 6.44.5 (árbol de actualizaciones a largo plazo) es vulnerable al agotamiento de la memoria. Mediante el envío de una petición HTTP diseñada, un atacante remoto autenticado pue... • https://packetstorm.news/files/id/154124 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •