Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
call-cc chicken vulnerabilities and exploits
(subscribe to this query)
9
CVSSv2
CVE-2013-2024
OS command injection vulnerability in the "qs" procedure from the "utils" module in Chicken prior to 4.9.0.
Call-cc Chicken
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
7.5
CVSSv2
CVE-2014-6310
Buffer overflow in CHICKEN 4.9.0 and 4.9.0.1 may allow remote malicious users to execute arbitrary code via the 'select' function.
Call-cc Chicken 4.9.0
Call-cc Chicken 4.9.0.1
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
7.5
CVSSv2
CVE-2013-2075
Multiple buffer overflows in the (1) R5RS char-ready, (2) tcp-accept-ready, and (3) file-select procedures in Chicken up to and including 4.8.0.3 allows malicious users to cause a denial of service (crash) by opening a file descriptor with a large integer value. NOTE: this issue ...
Call-cc Chicken
7.5
CVSSv2
CVE-2012-6125
Chicken prior to 4.8.0 is susceptible to algorithmic complexity attacks related to hash table collisions.
Call-cc Chicken
7.5
CVSSv2
CVE-2016-6830
The "process-execute" and "process-spawn" procedures in CHICKEN Scheme used fixed-size buffers for holding the arguments and environment variables to use in its execve() call. This would allow user-supplied argument/environment variable lists to trigger a buff...
Call-cc Chicken
7.5
CVSSv2
CVE-2014-9651
Buffer overflow in CHICKEN 4.9.0.x prior to 4.9.0.2, 4.9.x prior to 4.9.1, and prior to 5.0 allows malicious users to have unspecified impact via a positive START argument to the "substring-index[-ci] procedures."
Call-cc Chicken 4.9.0
Call-cc Chicken 4.9.0.1
Call-cc Chicken 4.10.0
7.5
CVSSv2
CVE-2014-3776
Buffer overflow in the "read-u8vector!" procedure in the srfi-4 unit in CHICKEN stable 4.8.0.7 and development snapshots prior to 4.9.1 allows remote malicious users to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary co...
Call-cc Chicken
Call-cc Chicken 4.8.0.7
7.5
CVSSv2
CVE-2013-4385
Buffer overflow in the "read-string!" procedure in the "extras" unit in CHICKEN stable prior to 4.8.0.5 and development snapshots prior to 4.8.3 allows remote malicious users to cause a denial of service (memory corruption and application crash) and possibly e...
Call-cc Chicken
Call-cc Chicken 4.8.0.3
Call-cc Chicken 4.5.0
Call-cc Chicken 4.4.0
Call-cc Chicken 3.2.0
Call-cc Chicken 3.1.0
Call-cc Chicken 4.7.0
Call-cc Chicken 4.6.0
Call-cc Chicken 3.4.0
Call-cc Chicken 3.3.0
Call-cc Chicken 4.8.0
Call-cc Chicken 4.7.0.6
Call-cc Chicken 4.1.0
Call-cc Chicken 4.0.0
Call-cc Chicken 4.8.0.2
Call-cc Chicken 4.8.0.1
Call-cc Chicken 4.3.0
Call-cc Chicken 4.2.0
Call-cc Chicken 3.0.0
Call-cc Chicken 4.7.4
Call-cc Chicken 4.7.3
Call-cc Chicken 4.6.1
6.8
CVSSv2
CVE-2017-6949
An issue exists in CHICKEN Scheme up to and including 4.12.0. When using a nonstandard CHICKEN-specific extension to allocate an SRFI-4 vector in unmanaged memory, the vector size would be used in unsanitised form as an argument to malloc(). With an unexpected size, the impact ma...
Call-cc Chicken 4.12.0
5
CVSSv2
CVE-2012-6124
A casting error in Chicken prior to 4.8.0 on 64-bit platform caused the random number generator to return a constant value. NOTE: the vendor states "This function wasn't used for security purposes (and is advertised as being unsuitable)."
Call-cc Chicken
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »