Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu chess vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-0204
Buffer overflow in GNU Chess (gnuchess) 5.02 and previous versions, if modified or used in a networked capacity contrary to its own design as a single-user application, may allow local or remote malicious users to execute arbitrary code via a long command.
Gnu Chess
7.8
CVSSv3
CVE-2019-15767
In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file.
Gnu Chess 6.2.5
7.8
CVSSv3
CVE-2021-30184
GNU Chess 6.2.7 allows malicious users to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.
Gnu Chess 6.2.7
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started