cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2021-30184,https://securityvulnerability.io/vulnerability/CVE-2021-30184,,GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.,Gnu,Chess,7.8,HIGH,0.0034600000362843275,false,false,false,false,,false,false,2021-04-07T11:30:55.000Z,0 CVE-2019-15767,https://securityvulnerability.io/vulnerability/CVE-2019-15767,,"In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file.",Gnu,Chess,7.8,HIGH,0.001230000052601099,false,false,false,false,,false,false,2019-08-29T02:05:12.000Z,0 CVE-2015-8972,https://securityvulnerability.io/vulnerability/CVE-2015-8972,,"Stack-based buffer overflow in the ValidateMove function in frontend/move.cc in GNU Chess (aka gnuchess) before 6.2.4 might allow context-dependent attackers to execute arbitrary code via a large input, as demonstrated when in UCI mode.",Gnu,Chess,9.8,CRITICAL,0.003280000062659383,false,false,false,false,,false,false,2017-01-23T21:00:00.000Z,0 CVE-2002-0204,https://securityvulnerability.io/vulnerability/CVE-2002-0204,,"Buffer overflow in GNU Chess (gnuchess) 5.02 and earlier, if modified or used in a networked capacity contrary to its own design as a single-user application, may allow local or remote attackers to execute arbitrary code via a long command.",Gnu,Chess,,,0.06818000227212906,false,false,false,false,,false,false,2002-05-16T04:00:00.000Z,0