Vulnerabilities > Call CC
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-06-01 | CVE-2017-9334 | Improper Input Validation vulnerability in Call-Cc Chicken An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it. | 5.0 |
2017-03-29 | CVE-2015-4556 | Improper Input Validation vulnerability in Call-Cc Chicken 4.8.0/4.9.0 The string-translate* procedure in the data-structures unit in CHICKEN before 4.10.0 allows remote attackers to cause a denial of service (crash). | 5.0 |
2017-03-16 | CVE-2017-6949 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Call-Cc Chicken 4.12.0 An issue was discovered in CHICKEN Scheme through 4.12.0. | 6.8 |
2017-01-10 | CVE-2016-6831 | Resource Exhaustion vulnerability in Call-Cc Chicken The "process-execute" and "process-spawn" procedures did not free memory correctly when the execve() call failed, resulting in a memory leak. | 5.0 |
2017-01-10 | CVE-2016-6830 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Call-Cc Chicken The "process-execute" and "process-spawn" procedures in CHICKEN Scheme used fixed-size buffers for holding the arguments and environment variables to use in its execve() call. | 7.5 |
2017-01-10 | CVE-2016-6287 | Data Processing Errors vulnerability in Call-Cc Http-Client 0.4.2/0.9 The "http-client" egg always used a HTTP_PROXY environment variable to determine whether HTTP traffic should be routed via a proxy, even when running as a CGI process. | 5.0 |
2017-01-10 | CVE-2016-6286 | Data Processing Errors vulnerability in Call-Cc Http-Client 0.4.2 The "spiffy-cgi-handlers" egg would convert a nonexistent "Proxy" header to the HTTP_PROXY environment variable, which would allow attackers to direct CGI programs which use this environment variable to use an attacker-specified HTTP proxy server (also known as a "httpoxy" attack). | 5.0 |
2015-08-28 | CVE-2014-9651 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Call-Cc Chicken 4.10.0/4.9.0/4.9.0.1 Buffer overflow in CHICKEN 4.9.0.x before 4.9.0.2, 4.9.x before 4.9.1, and before 5.0 allows attackers to have unspecified impact via a positive START argument to the "substring-index[-ci] procedures." | 7.5 |
2013-10-09 | CVE-2013-4385 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Call-Cc Chicken Buffer overflow in the "read-string!" procedure in the "extras" unit in CHICKEN stable before 4.8.0.5 and development snapshots before 4.8.3 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via a "#f" value in the NUM argument. | 7.5 |