Call-cc

Chicken

18 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.26%
  • Published 10.12.2022 16:15:09
  • Last modified 23.04.2025 14:15:25

egg-compile.scm in CHICKEN 5.x before 5.3.1 allows arbitrary OS command execution during package installation via escape characters in a .egg file.

  • EPSS 16.93%
  • Published 22.11.2019 19:15:12
  • Last modified 21.11.2024 02:14:08

Buffer overflow in CHICKEN 4.9.0 and 4.9.0.1 may allow remote attackers to execute arbitrary code via the 'select' function.

  • EPSS 0.82%
  • Published 31.10.2019 21:15:12
  • Last modified 21.11.2024 01:50:59

Multiple buffer overflows in the (1) R5RS char-ready, (2) tcp-accept-ready, and (3) file-select procedures in Chicken through 4.8.0.3 allows attackers to cause a denial of service (crash) by opening a file descriptor with a large integer value. NOTE:...

  • EPSS 0.64%
  • Published 31.10.2019 21:15:11
  • Last modified 21.11.2024 01:45:52

Chicken before 4.8.0 is susceptible to algorithmic complexity attacks related to hash table collisions.

  • EPSS 0.42%
  • Published 31.10.2019 21:15:11
  • Last modified 21.11.2024 01:45:52

A casting error in Chicken before 4.8.0 on 64-bit platform caused the random number generator to return a constant value. NOTE: the vendor states "This function wasn't used for security purposes (and is advertised as being unsuitable)."

  • EPSS 0.43%
  • Published 31.10.2019 21:15:11
  • Last modified 21.11.2024 01:45:52

Chicken before 4.8.0 does not properly handle NUL bytes in certain strings, which allows an attacker to conduct "poisoned NUL byte attack."

  • EPSS 2.13%
  • Published 31.10.2019 21:15:11
  • Last modified 21.11.2024 01:45:52

Buffer overflow in the thread scheduler in Chicken before 4.8.0.1 allows attackers to cause a denial of service (crash) by opening a file descriptor with a large integer value.

  • EPSS 3.02%
  • Published 31.10.2019 20:15:10
  • Last modified 21.11.2024 01:50:53

OS command injection vulnerability in the "qs" procedure from the "utils" module in Chicken before 4.9.0.

  • EPSS 0.35%
  • Published 17.07.2017 13:18:20
  • Last modified 20.04.2025 01:37:25

Due to an incomplete fix for CVE-2012-6125, all versions of CHICKEN Scheme up to and including 4.12.0 are vulnerable to an algorithmic complexity attack. An attacker can provide crafted input which, when inserted into the symbol table, will result in...

  • EPSS 0.44%
  • Published 01.06.2017 05:29:00
  • Last modified 20.04.2025 01:37:25

An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application tha...