cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2019-25051,https://securityvulnerability.io/vulnerability/CVE-2019-25051,Heap-Based Buffer Overflow in GNU Aspell by GNU,"The vulnerability in GNU Aspell versions prior to 0.60.8 involves a heap-based buffer overflow in the objstack component. Specifically, this issue arises during operations in the acommon namespace, such as duplication of the top object in the stack via the dup_top function. This flaw can potentially allow an attacker to exploit the buffer overflow, leading to unexpected behaviors or application crashes, thereby jeopardizing the stability and security of the software.",Gnu,Aspell,7.8,HIGH,0.000699999975040555,false,,false,false,false,,,false,false,,2021-07-20T06:46:25.000Z,0 CVE-2019-20433,https://securityvulnerability.io/vulnerability/CVE-2019-20433,Buffer Over-Read Vulnerability in GNU Aspell by GNU,"The GNU Aspell library, specifically libaspell.a, contains a buffer over-read vulnerability affecting versions prior to 0.60.8. This issue arises when using string encodings of ucs-2 or ucs-4, which can lead to unexpected behavior in applications. This vulnerability is exploitable when the encoding is incorrectly set externally, such as via the ASPELL_CONF environment variable, potentially allowing unauthorized access to sensitive data during operations.",Gnu,Aspell,9.1,CRITICAL,0.002219999907538295,false,,false,false,false,,,false,false,,2020-01-27T14:03:26.000Z,0 CVE-2019-17544,https://securityvulnerability.io/vulnerability/CVE-2019-17544,Buffer Over-read in GNU Aspell Library,"A vulnerability exists in the GNU Aspell library that allows for a stack-based buffer over-read. This occurs in the function acommon::unescape found in common/getdata.cpp when processing an isolated backslash ('\') character. This issue may lead to potential information leakage, as it could expose sensitive data from the stack.",Gnu,Aspell,9.1,CRITICAL,0.013890000060200691,false,,false,false,false,,,false,false,,2019-10-14T01:07:53.000Z,0 CVE-2004-0548,https://securityvulnerability.io/vulnerability/CVE-2004-0548,,"Multiple stack-based buffer overflows in the word-list-compress functionality in compress.c for Aspell allow local users to execute arbitrary code via a long entry in the wordlist that is not properly handled when using the (1) ""c"" compress option or (2) ""d"" decompress option.",Gnu,Aspell,,,0.0004199999966658652,false,,false,false,false,,,false,false,,2004-08-06T04:00:00.000Z,0