cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2019-25051,https://securityvulnerability.io/vulnerability/CVE-2019-25051,,objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::lookup_list).,Gnu,Aspell,7.8,HIGH,0.000699999975040555,false,false,false,false,,false,false,2021-07-20T06:46:25.000Z,0 CVE-2019-20433,https://securityvulnerability.io/vulnerability/CVE-2019-20433,,"libaspell.a in GNU Aspell before 0.60.8 has a buffer over-read for a string ending with a single '\0' byte, if the encoding is set to ucs-2 or ucs-4 outside of the application, as demonstrated by the ASPELL_CONF environment variable.",Gnu,Aspell,9.1,CRITICAL,0.002219999907538295,false,false,false,false,,false,false,2020-01-27T14:03:26.000Z,0 CVE-2019-17544,https://securityvulnerability.io/vulnerability/CVE-2019-17544,,libaspell.a in GNU Aspell before 0.60.8 has a stack-based buffer over-read in acommon::unescape in common/getdata.cpp via an isolated \ character.,Gnu,Aspell,9.1,CRITICAL,0.013890000060200691,false,false,false,false,,false,false,2019-10-14T01:07:53.000Z,0 CVE-2004-0548,https://securityvulnerability.io/vulnerability/CVE-2004-0548,,"Multiple stack-based buffer overflows in the word-list-compress functionality in compress.c for Aspell allow local users to execute arbitrary code via a long entry in the wordlist that is not properly handled when using the (1) ""c"" compress option or (2) ""d"" decompress option.",Gnu,Aspell,,,0.0004199999966658652,false,false,false,false,,false,false,2004-08-06T04:00:00.000Z,0