Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-14528

Опубликовано: 02 авг. 2019
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8
CVSS3: 7.8

Описание

GnuCOBOL 2.2 has a heap-based buffer overflow in read_literal in cobc/scanner.l via crafted COBOL source code.

РелизСтатусПримечание
bionic

DNE

devel

not-affected

3.0~rc1-2
disco

ignored

end of life
eoan

ignored

end of life
esm-apps/focal

needs-triage

esm-apps/jammy

not-affected

3.0~rc1-2
esm-apps/noble

not-affected

3.0~rc1-2
esm-infra-legacy/trusty

DNE

focal

ignored

end of standard support, was needs-triage
groovy

not-affected

3.0~rc1-2

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

DNE

disco

DNE

eoan

DNE

esm-apps/bionic

needs-triage

esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

Показывать по

EPSS

Процентиль: 40%
0.00179
Низкий

6.8 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
больше 6 лет назад

GnuCOBOL 2.2 has a heap-based buffer overflow in read_literal in cobc/scanner.l via crafted COBOL source code.

CVSS3: 7.8
debian
больше 6 лет назад

GnuCOBOL 2.2 has a heap-based buffer overflow in read_literal in cobc/ ...

github
больше 3 лет назад

GnuCOBOL 2.2 has a heap-based buffer overflow in read_literal in cobc/scanner.l via crafted COBOL source code.

EPSS

Процентиль: 40%
0.00179
Низкий

6.8 Medium

CVSS2

7.8 High

CVSS3