cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-39129,https://securityvulnerability.io/vulnerability/CVE-2023-39129,Heap Use After Free in GNU GDB Software by GNU,"A heap use after free vulnerability exists in GNU GDB, specifically in the add_pe_exported_sym() function located in the coff-pe-read.c file. This flaw may allow an attacker to exploit memory management issues, potentially leading to unpredictable behavior or the execution of arbitrary code. Proper sanitization and management of memory resources are essential to mitigate associated risks.",Gnu,Gdb,5.5,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2023-07-25T00:00:00.000Z,0 CVE-2023-39128,https://securityvulnerability.io/vulnerability/CVE-2023-39128,Stack Overflow Vulnerability in GNU gdb Version 13.0.50,"GNU gdb version 13.0.50.20220805-git has been identified to contain a stack overflow vulnerability in the ada_decode function located in /gdb/ada-lang.c. This flaw can potentially allow an attacker to exploit the stack overflow, which may lead to unexpected behavior or crash of the application, compromising system integrity. Users are urged to update to the latest version to mitigate any risks associated with this vulnerability.",Gnu,Gdb,5.5,MEDIUM,0.0006900000153109431,false,,false,false,false,,,false,false,,2023-07-25T00:00:00.000Z,0 CVE-2023-39130,https://securityvulnerability.io/vulnerability/CVE-2023-39130,Heap Buffer Overflow in GNU gdb Affects Multiple Versions,"The GNU gdb (GDB) debugging tool is susceptible to a heap buffer overflow, particularly within the function pe_as16(). This vulnerability, found in the source code located at /gdb/coff-pe-read.c, may allow an attacker to exploit memory allocation issues, potentially leading to arbitrary code execution. Developers and users are advised to consult relevant security patches to mitigate this risk and ensure the integrity of their systems.",Gnu,Gdb,5.5,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2023-07-25T00:00:00.000Z,0 CVE-2019-1010180,https://securityvulnerability.io/vulnerability/CVE-2019-1010180,Buffer Overflow Vulnerability in GNU gdb Affects All Versions,"GNU gdb, the widely used debugger, is susceptible to a buffer overflow vulnerability that leads to out-of-bounds memory access. This exploit manifests when an ELF file is opened for debugging, potentially resulting in a denial of service and memory disclosure. Additionally, there is a risk of arbitrary code execution, further compromising system integrity. As of now, no fix has been released for this issue, highlighting an urgent need for users to remain vigilant.",Gnu,Gdb,7.8,HIGH,0.0013599999947473407,false,,false,false,false,,,false,false,,2019-07-24T12:01:08.000Z,0 CVE-2017-9778,https://securityvulnerability.io/vulnerability/CVE-2017-9778,,"GNU Debugger (GDB) 8.0 and earlier fails to detect a negative length field in a DWARF section. A malformed section in an ELF binary or a core file can cause GDB to repeatedly allocate memory until a process limit is reached. This can, for example, impede efforts to analyze malware with GDB.",Gnu,Gdb,5.5,MEDIUM,0.0006699999794363976,false,,false,false,false,,,false,false,,2017-06-21T07:00:00.000Z,0 CVE-2011-4355,https://securityvulnerability.io/vulnerability/CVE-2011-4355,,"GNU Project Debugger (GDB) before 7.5, when .debug_gdb_scripts is defined, automatically loads certain files from the current working directory, which allows local users to gain privileges via crafted files such as Python scripts.",Gnu,Gdb,,,0.0004199999966658652,false,,false,false,false,,,false,false,,2013-03-05T21:38:00.000Z,0 CVE-2006-4146,https://securityvulnerability.io/vulnerability/CVE-2006-4146,,"Buffer overflow in the (1) DWARF (dwarfread.c) and (2) DWARF2 (dwarf2read.c) debugging code in GNU Debugger (GDB) 6.5 allows user-assisted attackers, or restricted users, to execute arbitrary code via a crafted file with a location block (DW_FORM_block) that contains a large number of operations.",Gnu,Gdb,,,0.004579999949783087,false,,false,false,false,,,false,false,,2006-08-31T22:00:00.000Z,0 CVE-2005-1704,https://securityvulnerability.io/vulnerability/CVE-2005-1704,,"Integer overflow in the Binary File Descriptor (BFD) library for gdb before 6.3, binutils, elfutils, and possibly other packages, allows user-assisted attackers to execute arbitrary code via a crafted object file that specifies a large number of section headers, leading to a heap-based buffer overflow.",Gnu,Gdb,,,0.0011599999852478504,false,,false,false,false,,,false,false,,2005-05-24T04:00:00.000Z,0 CVE-2005-1705,https://securityvulnerability.io/vulnerability/CVE-2005-1705,,"gdb before 6.3 searches the current working directory to load the .gdbinit configuration file, which allows local users to execute arbitrary commands as the user running gdb.",Gnu,Gdb,,,0.0004199999966658652,false,,false,false,false,,,false,false,,2005-05-24T04:00:00.000Z,0