Show filters
9 Total Results
Displaying 1-9 of 9
Sort by:
Attacker Value
Unknown

CVE-2018-9838

Disclosure Date: April 06, 2018 (last updated November 26, 2024)
The caml_ba_deserialize function in byterun/bigarray.c in the standard library in OCaml 4.06.0 has an integer overflow which, in situations where marshalled data is accepted from an untrusted source, allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted object.
0
Attacker Value
Unknown

CVE-2017-17519

Disclosure Date: December 14, 2017 (last updated November 26, 2024)
batteriesConfig.mlp in OCaml Batteries Included (aka ocaml-batteries) 2.6 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL.
0
Attacker Value
Unknown

CVE-2017-9779

Disclosure Date: September 07, 2017 (last updated November 26, 2024)
OCaml compiler allows attackers to have unspecified impact via unknown vectors, a similar issue to CVE-2017-9772 "but with much less impact."
0
Attacker Value
Unknown

CVE-2017-9772

Disclosure Date: June 23, 2017 (last updated November 26, 2024)
Insufficient sanitisation in the OCaml compiler versions 4.04.0 and 4.04.1 allows external code to be executed with raised privilege in binaries marked as setuid, by setting the CAML_CPLUGINS, CAML_NATIVE_CPLUGINS, or CAML_BYTE_CPLUGINS environment variable.
0
Attacker Value
Unknown

CVE-2015-8869

Disclosure Date: June 13, 2016 (last updated November 25, 2024)
OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.
0
Attacker Value
Unknown

CVE-2012-3514

Disclosure Date: August 25, 2012 (last updated October 04, 2023)
OCaml Xml-Light Library before r234 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via unspecified vectors.
0
Attacker Value
Unknown

CVE-2012-0839

Disclosure Date: February 08, 2012 (last updated October 04, 2023)
OCaml 3.12.1 and earlier computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
0
Attacker Value
Unknown

CVE-2009-2942

Disclosure Date: October 22, 2009 (last updated October 04, 2023)
The mysql-ocaml bindings 1.0.4 for MySQL do not properly support the mysql_real_escape_string function, which might allow remote attackers to leverage escaping issues involving multibyte character encodings.
0
Attacker Value
Unknown

CVE-2009-2943

Disclosure Date: October 22, 2009 (last updated October 04, 2023)
The postgresql-ocaml bindings 1.5.4, 1.7.0, and 1.12.1 for PostgreSQL libpq do not properly support the PQescapeStringConn function, which might allow remote attackers to leverage escaping issues involving multibyte character encodings.
0