cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2021-30184,https://securityvulnerability.io/vulnerability/CVE-2021-30184,Buffer Overflow in GNU Chess 6.2.7 Leads to Remote Code Execution,"GNU Chess 6.2.7 contains a vulnerability that allows attackers to execute arbitrary code through specially crafted Portable Game Notation (PGN) data. This issue arises from a buffer overflow linked to the use of a temporary file in the cmd_pgnload and cmd_pgnreplay functions of the application. As a result, an adversary could manipulate the game's input to gain unauthorized access and execute harmful commands on the affected system.",Gnu,Chess,7.8,HIGH,0.0034600000362843275,false,,false,false,false,,,false,false,,2021-04-07T11:30:55.000Z,0 CVE-2019-15767,https://securityvulnerability.io/vulnerability/CVE-2019-15767,Stack-Based Buffer Overflow in GNU Chess by The GNU Project,"In GNU Chess version 6.2.5, a severe stack-based buffer overflow vulnerability exists within the cmd_load function located in frontend/cmd.cc. This vulnerability can be exploited by providing a specially crafted chess position within an EPD file, potentially allowing attackers to execute arbitrary code or crash the application. Users and system administrators are advised to apply the recommended patches and updates to mitigate the risks associated with this security flaw.",Gnu,Chess,7.8,HIGH,0.001230000052601099,false,,false,false,false,,,false,false,,2019-08-29T02:05:12.000Z,0 CVE-2015-8972,https://securityvulnerability.io/vulnerability/CVE-2015-8972,,"Stack-based buffer overflow in the ValidateMove function in frontend/move.cc in GNU Chess (aka gnuchess) before 6.2.4 might allow context-dependent attackers to execute arbitrary code via a large input, as demonstrated when in UCI mode.",Gnu,Chess,9.8,CRITICAL,0.003280000062659383,false,,false,false,false,,,false,false,,2017-01-23T21:00:00.000Z,0 CVE-2002-0204,https://securityvulnerability.io/vulnerability/CVE-2002-0204,,"Buffer overflow in GNU Chess (gnuchess) 5.02 and earlier, if modified or used in a networked capacity contrary to its own design as a single-user application, may allow local or remote attackers to execute arbitrary code via a long command.",Gnu,Chess,,,0.06818000227212906,false,,false,false,false,,,false,false,,2002-05-16T04:00:00.000Z,0