[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250053

 
 

909

 
 

195940

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:1800060
An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it. Fixed In Version: chicken ...

oval:org.secpod.oval:def:1800869
An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it. Fixed In Version:¶ ch ...

oval:org.secpod.oval:def:1900421
An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all chicken-bin Scheme versions prior to 4.13,which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it.

oval:org.secpod.oval:def:2001404
An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it.

CPE    1
cpe:/a:call-cc:chicken
CWE    1
CWE-20
*CVE
CVE-2017-9334

© SecPod Technologies