
CVE-2020-25969
https://notcve.org/view.php?id=CVE-2020-25969
05 Jul 2023 — gnuplot v5.5 was discovered to contain a buffer overflow via the function plotrequest(). • https://sourceforge.net/p/gnuplot/bugs/2311 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2021-44917
https://notcve.org/view.php?id=CVE-2021-44917
21 Dec 2021 — A Divide by Zero vulnerability exists in gnuplot 5.4 in the boundary3d function in graph3d.c, which could cause a Arithmetic exception and application crash. Se presenta una vulnerabilidad de división por cero en gnuplot versión 5.4 en la función boundary3d en el archivo graph3d.c, que puede causar una excepción aritmética y un fallo de la aplicación • https://sourceforge.net/p/gnuplot/bugs/2358 • CWE-369: Divide By Zero •

CVE-2021-29369
https://notcve.org/view.php?id=CVE-2021-29369
03 May 2021 — The gnuplot package prior to version 0.1.0 for Node.js allows code execution via shell metacharacters in Gnuplot commands. El paquete gnuplot versiones anteriores 0.1.0 para Node.js permite una ejecución de código por medio de metacaracteres de shell en los comandos Gnuplot. • https://github.com/rkesters/gnuplot/commit/23671d4d3d28570fb19a936a6328bfac742410de • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2020-25412
https://notcve.org/view.php?id=CVE-2020-25412
16 Sep 2020 — com_line() in command.c in gnuplot 5.4 leads to an out-of-bounds-write from strncpy() that may lead to arbitrary code execution. com_line() en command.c en gnuplot 5.4 lleva a una escritura fuera de límites de strncpy() que puede llevar a la ejecución de código arbitrario • https://sourceforge.net/p/gnuplot/bugs/2303 • CWE-787: Out-of-bounds Write •

CVE-2020-25559
https://notcve.org/view.php?id=CVE-2020-25559
16 Sep 2020 — gnuplot 5.5 is affected by double free when executing print_set_output. This may result in context-dependent arbitrary code execution. gnuplot versión 5.5, está afectado por una doble liberación cuando se ejecutar la función print_set_output. Esto puede resultar en una ejecución de código arbitraria dependiendo del contexto • https://sourceforge.net/p/gnuplot/bugs/2312 • CWE-415: Double Free •

CVE-2018-19490 – Ubuntu Security Notice USN-4541-1
https://notcve.org/view.php?id=CVE-2018-19490
23 Nov 2018 — An issue was discovered in datafile.c in Gnuplot 5.2.5. This issue allows an attacker to conduct a heap-based buffer overflow with an arbitrary amount of data in df_generate_ascii_array_entry. To exploit this vulnerability, an attacker must pass an overlong string as the right bound of the range argument that is passed to the plot function. Se ha descubierto un problema en Gnuplot 5.2.5. Este problema permite a un atacante realizar un desbordamiento de búfer basado en memoria dinámica (heap) con una cantida... • http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00066.html • CWE-787: Out-of-bounds Write •

CVE-2018-19491 – Ubuntu Security Notice USN-4541-1
https://notcve.org/view.php?id=CVE-2018-19491
23 Nov 2018 — An issue was discovered in post.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the PS_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot postscript terminal is used as a backend. Se ha descubierto un problema en post.trm en Gnuplot 5.2.5. • http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00066.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2018-19492 – Ubuntu Security Notice USN-4541-1
https://notcve.org/view.php?id=CVE-2018-19492
23 Nov 2018 — An issue was discovered in cairo.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the cairotrm_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot pngcairo terminal is used as a backend. Se ha descubierto un problema en cairo.trm en Gnuplot 5.2.5. • http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00066.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2017-9670
https://notcve.org/view.php?id=CVE-2017-9670
15 Jun 2017 — An uninitialized stack variable vulnerability in load_tic_series() in set.c in gnuplot 5.2.rc1 allows an attacker to cause Denial of Service (Segmentation fault and Memory Corruption) or possibly have unspecified other impact when a victim opens a specially crafted file. Una vulnerabilidad en las variables no inicializadas de la pila -stack- en la función load_tic_series() en set.c de gnuplot 5.2.rc1 permite a un atacante causar una denegación de servicio (fallo de segmentación y corrupción de memoria) o po... • https://sourceforge.net/p/gnuplot/bugs/1933 • CWE-824: Access of Uninitialized Pointer •

CVE-2002-2259
https://notcve.org/view.php?id=CVE-2002-2259
31 Dec 2002 — Buffer overflow in the French documentation patch for Gnuplot 3.7 in SuSE Linux before 8.0 allows local users to execute arbitrary code as root via unknown attack vectors. • http://www.securityfocus.com/bid/6329 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •