Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Cflow
(Gnu)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 4 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-05-18 | CVE-2023-2789 | A vulnerability was found in GNU cflow 1.7. It has been rated as problematic. This issue affects the function func_body/parse_variable_declaration of the file parser.c. The manipulation leads to denial of service. The exploit has been disclosed to the public and may be used. The identifier VDB-229373 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | Cflow | 7.5 | ||
2021-05-18 | CVE-2020-23856 | Use-after-Free vulnerability in cflow 1.6 in the void call(char *name, int line) function at src/parser.c, which could cause a denial of service via the pointer variable caller->callee. | Fedora, Cflow | 5.5 | ||
2019-09-09 | CVE-2019-16166 | GNU cflow through 1.6 has a heap-based buffer over-read in the nexttoken function in parser.c. | Cflow | N/A | ||
2019-09-09 | CVE-2019-16165 | GNU cflow through 1.6 has a use-after-free in the reference function in parser.c. | Cflow | N/A |