Vulnerabilities > GNU > GDB
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-07-25 | CVE-2023-39128 | Out-of-bounds Write vulnerability in GNU GDB 13.0.50.20220805Git GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a stack overflow via the function ada_decode at /gdb/ada-lang.c. | 5.5 |
2023-07-25 | CVE-2023-39129 | Use After Free vulnerability in GNU GDB 13.0.50.20220805Git GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a heap use after free via the function add_pe_exported_sym() at /gdb/coff-pe-read.c. | 5.5 |
2023-07-25 | CVE-2023-39130 | Out-of-bounds Write vulnerability in GNU GDB 13.0.50.20220805Git GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a heap buffer overflow via the function pe_as16() at /gdb/coff-pe-read.c. | 5.5 |
2019-07-24 | CVE-2019-1010180 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. | 6.8 |
2017-06-21 | CVE-2017-9778 | Improper Input Validation vulnerability in GNU GDB GNU Debugger (GDB) 8.0 and earlier fails to detect a negative length field in a DWARF section. | 4.3 |
2006-08-31 | CVE-2006-4146 | Buffer Errors vulnerability in GNU GDB 6.5 Buffer overflow in the (1) DWARF (dwarfread.c) and (2) DWARF2 (dwarf2read.c) debugging code in GNU Debugger (GDB) 6.5 allows user-assisted attackers, or restricted users, to execute arbitrary code via a crafted file with a location block (DW_FORM_block) that contains a large number of operations. | 5.1 |
2005-05-24 | CVE-2005-1705 | Unspecified vulnerability in GNU GDB gdb before 6.3 searches the current working directory to load the .gdbinit configuration file, which allows local users to execute arbitrary commands as the user running gdb. | 7.2 |
2005-05-24 | CVE-2005-1704 | Numeric Errors vulnerability in GNU GDB Integer overflow in the Binary File Descriptor (BFD) library for gdb before 6.3, binutils, elfutils, and possibly other packages, allows user-assisted attackers to execute arbitrary code via a crafted object file that specifies a large number of section headers, leading to a heap-based buffer overflow. | 4.6 |