Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu chess vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2002-0204
Buffer overflow in GNU Chess (gnuchess) 5.02 and previous versions, if modified or used in a networked capacity contrary to its own design as a single-user application, may allow local or remote malicious users to execute arbitrary code via a long command.
Gnu Chess
6.8
CVSSv2
CVE-2019-15767
In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file.
Gnu Chess 6.2.5
6.8
CVSSv2
CVE-2021-30184
GNU Chess 6.2.7 allows malicious users to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.
Gnu Chess 6.2.7
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started