Max CVSS | 9.3 | Min CVSS | 5.8 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2019-13638 | 9.3 |
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable sy
|
16-08-2019 - 12:15 | 26-07-2019 - 13:15 | |
CVE-2018-1000156 | 6.8 |
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via th
|
30-07-2019 - 10:15 | 06-04-2018 - 13:29 | |
CVE-2019-13636 | 5.8 |
In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.
|
24-07-2019 - 17:15 | 17-07-2019 - 21:15 |