Show filters
10 Total Results
Displaying 1-10 of 10
Sort by:
Attacker Value
Unknown
CVE-2020-25969
Disclosure Date: July 05, 2023 (last updated October 08, 2023)
gnuplot v5.5 was discovered to contain a buffer overflow via the function plotrequest().
0
Attacker Value
Unknown
CVE-2021-44917
Disclosure Date: December 21, 2021 (last updated February 23, 2025)
A Divide by Zero vulnerability exists in gnuplot 5.4 in the boundary3d function in graph3d.c, which could cause a Arithmetic exception and application crash.
0
Attacker Value
Unknown
CVE-2021-29369
Disclosure Date: May 03, 2021 (last updated February 22, 2025)
The gnuplot package prior to version 0.1.0 for Node.js allows code execution via shell metacharacters in Gnuplot commands.
0
Attacker Value
Unknown
CVE-2020-25412
Disclosure Date: September 16, 2020 (last updated February 22, 2025)
com_line() in command.c in gnuplot 5.4 leads to an out-of-bounds-write from strncpy() that may lead to arbitrary code execution.
0
Attacker Value
Unknown
CVE-2020-25559
Disclosure Date: September 16, 2020 (last updated February 22, 2025)
gnuplot 5.5 is affected by double free when executing print_set_output. This may result in context-dependent arbitrary code execution.
0
Attacker Value
Unknown
CVE-2018-19492
Disclosure Date: November 23, 2018 (last updated November 27, 2024)
An issue was discovered in cairo.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the cairotrm_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot pngcairo terminal is used as a backend.
0
Attacker Value
Unknown
CVE-2018-19490
Disclosure Date: November 23, 2018 (last updated November 27, 2024)
An issue was discovered in datafile.c in Gnuplot 5.2.5. This issue allows an attacker to conduct a heap-based buffer overflow with an arbitrary amount of data in df_generate_ascii_array_entry. To exploit this vulnerability, an attacker must pass an overlong string as the right bound of the range argument that is passed to the plot function.
0
Attacker Value
Unknown
CVE-2018-19491
Disclosure Date: November 23, 2018 (last updated November 27, 2024)
An issue was discovered in post.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the PS_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot postscript terminal is used as a backend.
0
Attacker Value
Unknown
CVE-2017-9670
Disclosure Date: June 15, 2017 (last updated November 26, 2024)
An uninitialized stack variable vulnerability in load_tic_series() in set.c in gnuplot 5.2.rc1 allows an attacker to cause Denial of Service (Segmentation fault and Memory Corruption) or possibly have unspecified other impact when a victim opens a specially crafted file.
0
Attacker Value
Unknown
CVE-2002-2259
Disclosure Date: December 31, 2002 (last updated February 22, 2025)
Buffer overflow in the French documentation patch for Gnuplot 3.7 in SuSE Linux before 8.0 allows local users to execute arbitrary code as root via unknown attack vectors.
0