Количество 4
Количество 4
CVE-2018-25154
GNU Barcode 0.99 contains a buffer overflow vulnerability in its code 93 encoding process that allows attackers to trigger memory corruption. Attackers can exploit boundary errors during input file processing to potentially execute arbitrary code on the affected system.
CVE-2018-25154
GNU Barcode 0.99 contains a buffer overflow vulnerability in its code 93 encoding process that allows attackers to trigger memory corruption. Attackers can exploit boundary errors during input file processing to potentially execute arbitrary code on the affected system.
CVE-2018-25154
GNU Barcode 0.99 contains a buffer overflow vulnerability in its code ...
GHSA-fv28-hc36-43g9
GNU Barcode 0.99 contains a buffer overflow vulnerability in its code 93 encoding process that allows attackers to trigger memory corruption. Attackers can exploit boundary errors during input file processing to potentially execute arbitrary code on the affected system.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2018-25154 GNU Barcode 0.99 contains a buffer overflow vulnerability in its code 93 encoding process that allows attackers to trigger memory corruption. Attackers can exploit boundary errors during input file processing to potentially execute arbitrary code on the affected system. | CVSS3: 9.8 | 0% Низкий | около 2 месяцев назад | |
CVE-2018-25154 GNU Barcode 0.99 contains a buffer overflow vulnerability in its code 93 encoding process that allows attackers to trigger memory corruption. Attackers can exploit boundary errors during input file processing to potentially execute arbitrary code on the affected system. | CVSS3: 9.8 | 0% Низкий | около 2 месяцев назад | |
CVE-2018-25154 GNU Barcode 0.99 contains a buffer overflow vulnerability in its code ... | CVSS3: 9.8 | 0% Низкий | около 2 месяцев назад | |
GHSA-fv28-hc36-43g9 GNU Barcode 0.99 contains a buffer overflow vulnerability in its code 93 encoding process that allows attackers to trigger memory corruption. Attackers can exploit boundary errors during input file processing to potentially execute arbitrary code on the affected system. | CVSS3: 9.8 | 0% Низкий | около 2 месяцев назад |
Уязвимостей на страницу