A vulnerability classified as problematic has been found in GNU Recutils 1.8. This affects the function rec_fex_size of the file rec-fex.c. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2019-6456. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as problematic was found in GNU Recutils 1.8. This vulnerability affects the function rec_aggregate_reg_new of the file rec-aggregate.c. The manipulation leads to improper resource management.
This vulnerability was named CVE-2019-6457. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in GNU Recutils 1.8. This issue affects the function rec_buf_new of the file rec-buf.c. The manipulation leads to improper resource management.
The identification of this vulnerability is CVE-2019-6458. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in GNU Recutils 1.8. Affected is the function rec_extract_type of the file rec-utils.c. The manipulation leads to improper resource management.
This vulnerability is traded as CVE-2019-6459. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability has been found in GNU Recutils 1.8 and classified as problematic. Affected by this vulnerability is the function rec_field_set_name of the file rec-field.c. The manipulation leads to null pointer dereference.
This vulnerability is known as CVE-2019-6460. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in GNU Recutils 1.8. It has been rated as critical. Affected by this issue is the function rec_mset_elem_destroy of the file rec-mset.c. The manipulation leads to double free.
This vulnerability is handled as CVE-2019-6455. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic has been found in GNU Recutils 1.8. Affected is the function rec_field_name_equal_p of the file rec-field-name.c. The manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2019-11638. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability classified as critical was found in GNU Recutils 1.8. Affected by this vulnerability is the function rec_type_check_enum of the file rec-types.c. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2019-11639. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in GNU Recutils 1.8. Affected by this issue is the function rec_fex_parse_str_simple of the file rec-fex.c. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2019-11640. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in GNU Recutils 1.8. It has been rated as problematic. This issue affects the function rec_rset_get_props of the file rec-rset.c. The manipulation leads to out-of-bounds read.
The identification of this vulnerability is CVE-2019-11637. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in GNU Recutils 1.8.90 and classified as problematic. Affected by this issue is the function rec_db_destroy of the file rec-db.c. The manipulation leads to null pointer dereference.
This vulnerability is handled as CVE-2021-46019. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability was found in GNU Recutils 1.8.90. It has been classified as critical. This affects the function rec_record_destroy of the file rec-record.c. The manipulation leads to use after free.
This vulnerability is uniquely identified as CVE-2021-46021. The attack needs to be done within the local network. There is no exploit available.