|Max CVSS||7.5||Min CVSS||7.2||Total Count||2|
|ID||CVSS||Summary||Last (major) update||Published|
glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made t
|04-09-2019 - 23:15||19-06-2017 - 16:29|
Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
|30-10-2018 - 16:27||19-04-2016 - 21:59|