Show filters
11 Total Results
Displaying 1-10 of 11
Sort by:
Attacker Value
Unknown
CVE-2020-25969
Disclosure Date: July 05, 2023 (last updated October 08, 2023)
gnuplot v5.5 was discovered to contain a buffer overflow via the function plotrequest().
0
Attacker Value
Unknown
CVE-2021-33360
Disclosure Date: March 10, 2023 (last updated October 08, 2023)
An issue found in Stoqey gnuplot v.0.0.3 and earlier allows attackers to execute arbitrary code via the src/index.ts, plotCallack, child_process, and/or filePath parameter(s).
0
Attacker Value
Unknown
CVE-2021-44917
Disclosure Date: December 21, 2021 (last updated February 23, 2025)
A Divide by Zero vulnerability exists in gnuplot 5.4 in the boundary3d function in graph3d.c, which could cause a Arithmetic exception and application crash.
0
Attacker Value
Unknown
CVE-2021-29369
Disclosure Date: May 03, 2021 (last updated February 22, 2025)
The gnuplot package prior to version 0.1.0 for Node.js allows code execution via shell metacharacters in Gnuplot commands.
0
Attacker Value
Unknown
CVE-2020-25412
Disclosure Date: September 16, 2020 (last updated February 22, 2025)
com_line() in command.c in gnuplot 5.4 leads to an out-of-bounds-write from strncpy() that may lead to arbitrary code execution.
0
Attacker Value
Unknown
CVE-2020-25559
Disclosure Date: September 16, 2020 (last updated February 22, 2025)
gnuplot 5.5 is affected by double free when executing print_set_output. This may result in context-dependent arbitrary code execution.
0
Attacker Value
Unknown
CVE-2018-19492
Disclosure Date: November 23, 2018 (last updated November 27, 2024)
An issue was discovered in cairo.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the cairotrm_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot pngcairo terminal is used as a backend.
0
Attacker Value
Unknown
CVE-2018-19490
Disclosure Date: November 23, 2018 (last updated November 27, 2024)
An issue was discovered in datafile.c in Gnuplot 5.2.5. This issue allows an attacker to conduct a heap-based buffer overflow with an arbitrary amount of data in df_generate_ascii_array_entry. To exploit this vulnerability, an attacker must pass an overlong string as the right bound of the range argument that is passed to the plot function.
0
Attacker Value
Unknown
CVE-2018-19491
Disclosure Date: November 23, 2018 (last updated November 27, 2024)
An issue was discovered in post.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the PS_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot postscript terminal is used as a backend.
0
Attacker Value
Unknown
CVE-2017-9670
Disclosure Date: June 15, 2017 (last updated November 26, 2024)
An uninitialized stack variable vulnerability in load_tic_series() in set.c in gnuplot 5.2.rc1 allows an attacker to cause Denial of Service (Segmentation fault and Memory Corruption) or possibly have unspecified other impact when a victim opens a specially crafted file.
0