Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
call-cc chicken vulnerabilities and exploits
(subscribe to this query)
801
VMScore
CVE-2013-2024
OS command injection vulnerability in the "qs" procedure from the "utils" module in Chicken prior to 4.9.0.
Call-cc Chicken
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
668
VMScore
CVE-2014-6310
Buffer overflow in CHICKEN 4.9.0 and 4.9.0.1 may allow remote malicious users to execute arbitrary code via the 'select' function.
Call-cc Chicken 4.9.0
Call-cc Chicken 4.9.0.1
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
668
VMScore
CVE-2013-2075
Multiple buffer overflows in the (1) R5RS char-ready, (2) tcp-accept-ready, and (3) file-select procedures in Chicken up to and including 4.8.0.3 allows malicious users to cause a denial of service (crash) by opening a file descriptor with a large integer value. NOTE: this issue ...
Call-cc Chicken
668
VMScore
CVE-2012-6125
Chicken prior to 4.8.0 is susceptible to algorithmic complexity attacks related to hash table collisions.
Call-cc Chicken
668
VMScore
CVE-2016-6830
The "process-execute" and "process-spawn" procedures in CHICKEN Scheme used fixed-size buffers for holding the arguments and environment variables to use in its execve() call. This would allow user-supplied argument/environment variable lists to trigger a buff...
Call-cc Chicken
668
VMScore
CVE-2014-9651
Buffer overflow in CHICKEN 4.9.0.x prior to 4.9.0.2, 4.9.x prior to 4.9.1, and prior to 5.0 allows malicious users to have unspecified impact via a positive START argument to the "substring-index[-ci] procedures."
Call-cc Chicken 4.9.0
Call-cc Chicken 4.9.0.1
Call-cc Chicken 4.10.0
668
VMScore
CVE-2014-3776
Buffer overflow in the "read-u8vector!" procedure in the srfi-4 unit in CHICKEN stable 4.8.0.7 and development snapshots prior to 4.9.1 allows remote malicious users to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary co...
Call-cc Chicken
Call-cc Chicken 4.8.0.7
668
VMScore
CVE-2013-4385
Buffer overflow in the "read-string!" procedure in the "extras" unit in CHICKEN stable prior to 4.8.0.5 and development snapshots prior to 4.8.3 allows remote malicious users to cause a denial of service (memory corruption and application crash) and possibly e...
Call-cc Chicken
Call-cc Chicken 4.8.0.3
Call-cc Chicken 4.5.0
Call-cc Chicken 4.4.0
Call-cc Chicken 3.2.0
Call-cc Chicken 3.1.0
Call-cc Chicken 4.7.0
Call-cc Chicken 4.6.0
Call-cc Chicken 3.4.0
Call-cc Chicken 3.3.0
Call-cc Chicken 4.8.0
Call-cc Chicken 4.7.0.6
Call-cc Chicken 4.1.0
Call-cc Chicken 4.0.0
Call-cc Chicken 4.8.0.2
Call-cc Chicken 4.8.0.1
Call-cc Chicken 4.3.0
Call-cc Chicken 4.2.0
Call-cc Chicken 3.0.0
Call-cc Chicken 4.7.4
Call-cc Chicken 4.7.3
Call-cc Chicken 4.6.1
605
VMScore
CVE-2017-6949
An issue exists in CHICKEN Scheme up to and including 4.12.0. When using a nonstandard CHICKEN-specific extension to allocate an SRFI-4 vector in unmanaged memory, the vector size would be used in unsanitised form as an argument to malloc(). With an unexpected size, the impact ma...
Call-cc Chicken 4.12.0
445
VMScore
CVE-2012-6123
Chicken prior to 4.8.0 does not properly handle NUL bytes in certain strings, which allows an malicious user to conduct "poisoned NUL byte attack."
Call-cc Chicken
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »