CVE-2025-31115
- EPSS 0.18%
- Veröffentlicht 03.04.2025 17:15:30
- Zuletzt bearbeitet 07.04.2025 14:18:34
XZ Utils provide a general-purpose data-compression library plus command-line tools. In XZ Utils 5.3.3alpha to 5.8.0, the multithreaded .xz decoder in liblzma has a bug where invalid input can at least result in a crash. The effects include heap use ...
CVE-2024-47611
- EPSS 0.3%
- Veröffentlicht 02.10.2024 15:15:14
- Zuletzt bearbeitet 21.11.2024 17:15:17
XZ Utils provide a general-purpose data-compression library plus command-line tools. When built for native Windows (MinGW-w64 or MSVC), the command line tools from XZ Utils 5.6.2 and older have a command line argument injection vulnerability. If a co...
- EPSS 86.32%
- Veröffentlicht 29.03.2024 17:15:21
- Zuletzt bearbeitet 19.08.2025 01:15:57
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, w...
CVE-2020-22916
- EPSS 0.04%
- Veröffentlicht 22.08.2023 19:16:19
- Zuletzt bearbeitet 21.11.2024 05:13:28
An issue discovered in XZ 5.2.5 allows attackers to cause a denial of service via decompression of a crafted file. NOTE: the vendor disputes the claims of "endless output" and "denial of service" because decompression of the 17,486 bytes always resul...
CVE-2022-1271
- EPSS 0.72%
- Veröffentlicht 31.08.2022 16:15:09
- Zuletzt bearbeitet 09.06.2025 15:15:26
An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file....
CVE-2015-4035
- EPSS 0.61%
- Veröffentlicht 25.07.2017 18:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
scripts/xzgrep.in in xzgrep 5.2.x before 5.2.0, before 5.0.0 does not properly process file names containing semicolons, which allows remote attackers to execute arbitrary code by having a user run xzgrep on a crafted file name.