|Max CVSS||7.2||Min CVSS||5.0||Total Count||2|
|ID||CVSS||Summary||Last (major) update||Published|
glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made t
|15-10-2020 - 13:28||19-06-2017 - 16:29|
Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.
|30-10-2018 - 16:27||01-06-2016 - 20:59|