Call-cc

Chicken

18 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.26%
  • Veröffentlicht 10.12.2022 16:15:09
  • Zuletzt bearbeitet 23.04.2025 14:15:25

egg-compile.scm in CHICKEN 5.x before 5.3.1 allows arbitrary OS command execution during package installation via escape characters in a .egg file.

  • EPSS 16.93%
  • Veröffentlicht 22.11.2019 19:15:12
  • Zuletzt bearbeitet 21.11.2024 02:14:08

Buffer overflow in CHICKEN 4.9.0 and 4.9.0.1 may allow remote attackers to execute arbitrary code via the 'select' function.

  • EPSS 0.82%
  • Veröffentlicht 31.10.2019 21:15:12
  • Zuletzt bearbeitet 21.11.2024 01:50:59

Multiple buffer overflows in the (1) R5RS char-ready, (2) tcp-accept-ready, and (3) file-select procedures in Chicken through 4.8.0.3 allows attackers to cause a denial of service (crash) by opening a file descriptor with a large integer value. NOTE:...

  • EPSS 0.64%
  • Veröffentlicht 31.10.2019 21:15:11
  • Zuletzt bearbeitet 21.11.2024 01:45:52

Chicken before 4.8.0 is susceptible to algorithmic complexity attacks related to hash table collisions.

  • EPSS 0.42%
  • Veröffentlicht 31.10.2019 21:15:11
  • Zuletzt bearbeitet 21.11.2024 01:45:52

A casting error in Chicken before 4.8.0 on 64-bit platform caused the random number generator to return a constant value. NOTE: the vendor states "This function wasn't used for security purposes (and is advertised as being unsuitable)."

  • EPSS 0.43%
  • Veröffentlicht 31.10.2019 21:15:11
  • Zuletzt bearbeitet 21.11.2024 01:45:52

Chicken before 4.8.0 does not properly handle NUL bytes in certain strings, which allows an attacker to conduct "poisoned NUL byte attack."

  • EPSS 2.13%
  • Veröffentlicht 31.10.2019 21:15:11
  • Zuletzt bearbeitet 21.11.2024 01:45:52

Buffer overflow in the thread scheduler in Chicken before 4.8.0.1 allows attackers to cause a denial of service (crash) by opening a file descriptor with a large integer value.

  • EPSS 3.02%
  • Veröffentlicht 31.10.2019 20:15:10
  • Zuletzt bearbeitet 21.11.2024 01:50:53

OS command injection vulnerability in the "qs" procedure from the "utils" module in Chicken before 4.9.0.

  • EPSS 0.35%
  • Veröffentlicht 17.07.2017 13:18:20
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Due to an incomplete fix for CVE-2012-6125, all versions of CHICKEN Scheme up to and including 4.12.0 are vulnerable to an algorithmic complexity attack. An attacker can provide crafted input which, when inserted into the symbol table, will result in...

  • EPSS 0.44%
  • Veröffentlicht 01.06.2017 05:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application tha...