2 results (0.010 seconds)

CVSS: 10.0EPSS: 1%CPEs: 3EXPL: 0

The is_utf8_well_formed function in GNU less before 475 allows remote attackers to have unspecified impact via malformed UTF-8 characters, which triggers an out-of-bounds read. La función is_utf8_well_formed en GNU less anterior a 475 permite a atacantes remotos tener un impacto no especificado a través de caracteres UFT-8 malformados, lo que provoca una lectura fuera de rango. • http://advisories.mageia.org/MGASA-2015-0139.html http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159449.html http://lists.opensuse.org/opensuse-updates/2015-03/msg00077.html http://www.mandriva.com/security/advisories?name=MDVSA-2015:199 https://blog.fuzzing-project.org/3-less-out-of-bounds-read-access-TFPA-0022014.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.4EPSS: 0%CPEs: 3EXPL: 0

Format string bug in the open_altfile function in filename.c for GNU less 382, 381, and 358 might allow local users to cause a denial of service or possibly execute arbitrary code via format strings in the LESSOPEN environment variable. NOTE: since less is not setuid or setgid, then this is not a vulnerability unless there are plausible scenarios under which privilege boundaries could be crossed • http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0794.html http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0811.html http://securitytracker.com/id?1010988 http://www.osvdb.org/9014 https://exchange.xforce.ibmcloud.com/vulnerabilities/17032 •