Vulnerabilities
Vulnerable Software
Debian:  >> Debian Linux  Security Vulnerabilities
fig2dev 3.2.7b contains a stack buffer overflow in the read_textobject function in read.c.
CVSS Score
5.5
EPSS Score
0.004
Published
2021-09-16
fig2dev 3.2.7b contains a global buffer overflow in the get_line function in read.c.
CVSS Score
5.5
EPSS Score
0.004
Published
2021-09-16
fig2dev 3.2.7b contains a segmentation fault in the gencgm_start function in gencgm.c.
CVSS Score
5.5
EPSS Score
0.005
Published
2021-09-16
fig2dev 3.2.7b contains a stack buffer overflow in the bezier_spline function in genepic.c.
CVSS Score
5.5
EPSS Score
0.005
Published
2021-09-16
fig2dev 3.2.7b contains a segmentation fault in the read_objects function in read.c.
CVSS Score
5.5
EPSS Score
0.004
Published
2021-09-16
fig2dev 3.2.7b contains a global buffer overflow in the conv_pattern_index function in gencgm.c.
CVSS Score
5.5
EPSS Score
0.005
Published
2021-09-16
fig2dev 3.2.7b contains a global buffer overflow in the setfigfont function in genepic.c.
CVSS Score
5.5
EPSS Score
0.005
Published
2021-09-16
Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.
CVSS Score
7.5
EPSS Score
0.103
Published
2021-09-16
A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
CVSS Score
7.5
EPSS Score
0.037
Published
2021-09-16
ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.
CVSS Score
9.8
EPSS Score
0.377
Published
2021-09-16


Contact Us

Shodan ® - All rights reserved