Show filters
1,191 Total Results
Displaying 391-400 of 1,191
Sort by:
Attacker Value
Unknown

CVE-2012-6711

Disclosure Date: June 18, 2019 (last updated November 08, 2023)
A heap-based buffer overflow exists in GNU Bash before 4.3 when wide characters, not supported by the current locale set in the LC_CTYPE environment variable, are printed through the echo built-in function. A local attacker, who can provide data to print through the "echo -e" built-in function, may use this flaw to crash a script or execute code with the privileges of the bash process. This occurs because ansicstr() in lib/sh/strtrans.c mishandles u32cconv().
0
Attacker Value
Unknown

CVE-2018-12886

Disclosure Date: May 22, 2019 (last updated November 27, 2024)
stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.
0
Attacker Value
Unknown

CVE-2019-5953

Disclosure Date: May 17, 2019 (last updated November 27, 2024)
Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors.
0
Attacker Value
Unknown

CVE-2019-11637

Disclosure Date: May 01, 2019 (last updated November 27, 2024)
An issue was discovered in GNU recutils 1.8. There is a NULL pointer dereference in the function rec_rset_get_props at rec-rset.c in librec.a, leading to a crash.
0
Attacker Value
Unknown

CVE-2019-11639

Disclosure Date: May 01, 2019 (last updated November 27, 2024)
An issue was discovered in GNU recutils 1.8. There is a stack-based buffer overflow in the function rec_type_check_enum at rec-types.c in librec.a.
0
Attacker Value
Unknown

CVE-2019-11640

Disclosure Date: May 01, 2019 (last updated November 27, 2024)
An issue was discovered in GNU recutils 1.8. There is a heap-based buffer overflow in the function rec_fex_parse_str_simple at rec-fex.c in librec.a.
0
Attacker Value
Unknown

CVE-2019-11638

Disclosure Date: May 01, 2019 (last updated November 27, 2024)
An issue was discovered in GNU recutils 1.8. There is a NULL pointer dereference in the function rec_field_name_equal_p at rec-field-name.c in librec.a, leading to a crash.
0
Attacker Value
Unknown

CVE-2006-7254

Disclosure Date: April 10, 2019 (last updated November 27, 2024)
The nscd daemon in the GNU C Library (glibc) before version 2.5 does not close incoming client sockets if they cannot be handled by the daemon, allowing local users to carry out a denial of service attack on the daemon.
0
Attacker Value
Unknown

CVE-2005-3590

Disclosure Date: April 10, 2019 (last updated November 27, 2024)
The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.
0
Attacker Value
Unknown

CVE-2019-3836

Disclosure Date: April 01, 2019 (last updated November 08, 2023)
It was discovered in gnutls before version 3.6.7 upstream that there is an uninitialized pointer access in gnutls versions 3.6.3 or later which can be triggered by certain post-handshake messages.
0