Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sat, 28 Mar 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Generic-mapping-tools
Generic-mapping-tools gmt |
|
| CPEs | cpe:2.3:a:generic-mapping-tools:gmt:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Generic-mapping-tools
Generic-mapping-tools gmt |
Fri, 27 Mar 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Genericmappingtools
Genericmappingtools gmt |
|
| Vendors & Products |
Genericmappingtools
Genericmappingtools gmt |
Fri, 20 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GMT is an open source collection of command-line tools for manipulating geographic and Cartesian data sets. In versions from 6.6.0 and prior, a stack-based buffer overflow vulnerability was identified in the gmt_remote_dataset_id function within src/gmt_remote.c. This issue occurs when a specially crafted long string is passed as a dataset identifier (e.g., via the which module), leading to a crash or potential arbitrary code execution. This issue has been patched via commit 0ad2b49. | |
| Title | GMT: Stack-based Buffer Overflow in gmt_remote_dataset_id | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-25T13:56:20.930Z
Reserved: 2026-03-17T21:17:08.884Z
Link: CVE-2026-33147
Updated: 2026-03-25T13:56:12.581Z
Status : Analyzed
Published: 2026-03-20T21:17:15.243
Modified: 2026-03-27T21:07:19.390
Link: CVE-2026-33147
No data.
OpenCVE Enrichment
Updated: 2026-03-29T20:28:55Z