Vulnerabilities > GNU > Critical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-02-24 | CVE-2020-9366 | Out-of-bounds Write vulnerability in GNU Screen A buffer overflow was found in the way GNU Screen before 4.8.0 treated the special escape OSC 49. | 9.8 |
2020-01-27 | CVE-2019-20433 | Out-of-bounds Read vulnerability in GNU Aspell libaspell.a in GNU Aspell before 0.60.8 has a buffer over-read for a string ending with a single '\0' byte, if the encoding is set to ucs-2 or ucs-4 outside of the application, as demonstrated by the ASPELL_CONF environment variable. | 9.1 |
2020-01-24 | CVE-2015-4042 | Integer Overflow or Wraparound vulnerability in GNU Coreutils Integer overflow in the keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 might allow attackers to cause a denial of service (application crash) or possibly have unspecified other impact via long strings. | 9.8 |
2019-11-19 | CVE-2012-0824 | Use of Externally-Controlled Format String vulnerability in GNU Gnusound 0.7.5 gnusound 0.7.5 has format string issue | 9.8 |
2019-10-21 | CVE-2019-18224 | Out-of-bounds Write vulnerability in GNU Libidn2 idn2_to_ascii_4i in lib/lookup.c in GNU libidn2 before 2.1.1 has a heap-based buffer overflow via a long domain string. | 9.8 |
2019-10-14 | CVE-2019-17544 | Out-of-bounds Read vulnerability in multiple products libaspell.a in GNU Aspell before 0.60.8 has a stack-based buffer over-read in acommon::unescape in common/getdata.cpp via an isolated \ character. | 9.1 |
2019-07-15 | CVE-2019-1010022 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in GNU Glibc GNU Libc current is affected by: Mitigation bypass. | 9.8 |
2019-05-17 | CVE-2019-5953 | Out-of-bounds Write vulnerability in GNU Wget Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors. | 9.8 |
2019-04-10 | CVE-2005-3590 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in GNU Glibc The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory. | 9.8 |
2019-03-14 | CVE-2019-9775 | Out-of-bounds Read vulnerability in multiple products An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. | 9.1 |