Max CVSS | 9.3 | Min CVSS | 4.3 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2018-20969 | 9.3 |
do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.
|
05-09-2019 - 16:15 | 16-08-2019 - 04:15 | |
CVE-2019-13638 | 9.3 |
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable sy
|
16-08-2019 - 12:15 | 26-07-2019 - 13:15 | |
CVE-2018-6952 | 5.0 |
A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6.
|
17-04-2019 - 20:29 | 13-02-2018 - 19:29 | |
CVE-2016-10713 | 4.3 |
An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file.
|
18-04-2018 - 01:29 | 13-02-2018 - 19:29 |