Max CVSS | 10.0 | Min CVSS | 2.6 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2013-4237 | 6.8 |
An out-of-bounds write flaw was found in the way the glibc's readdir_r() function handled file system entries longer than the NAME_MAX character constant. A remote attacker could provide a specially crafted NTFS or CIFS file system that, when process
|
02-02-2023 - 20:15 | 09-10-2013 - 22:55 | |
CVE-2013-4332 | 4.3 |
Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in glibc's memory allocator functions (pvalloc, valloc, and memalign). If an application used such a function, it could cause the application to crash or, potentially
|
02-02-2023 - 20:15 | 09-10-2013 - 22:55 | |
CVE-2013-4458 | 5.0 |
It was found that getaddrinfo() did not limit the amount of stack memory used during name resolution. An attacker able to make an application resolve an attacker-controlled hostname or IP address could possibly cause the application to exhaust all st
|
02-02-2023 - 20:15 | 12-12-2013 - 18:55 | |
CVE-2012-3480 | 4.6 |
CVE-2012-3480 glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines
|
02-02-2023 - 16:15 | 25-08-2012 - 10:29 | |
CVE-2015-0235 | 10.0 |
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 fu
|
05-07-2022 - 18:42 | 28-01-2015 - 19:59 | |
CVE-2013-1914 | 5.0 |
Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that trigg
|
01-09-2021 - 18:15 | 29-04-2013 - 22:55 | |
CVE-2012-4412 | 7.5 |
Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-base
|
13-06-2019 - 21:29 | 09-10-2013 - 22:55 | |
CVE-2014-4043 | 7.5 |
The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.
|
13-06-2019 - 21:29 | 06-10-2014 - 23:55 | |
CVE-2012-3406 | 6.8 |
The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not "properly restrict the use of" the alloca function when allocating the SPECS array, which allows context-dependent attackers
|
22-04-2019 - 17:48 | 10-02-2014 - 18:15 | |
CVE-2012-3404 | 5.0 |
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.12 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection
|
22-04-2019 - 17:48 | 10-02-2014 - 18:15 | |
CVE-2012-3405 | 5.0 |
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection
|
22-04-2019 - 17:48 | 10-02-2014 - 18:15 | |
CVE-2013-0242 | 5.0 |
Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyt
|
29-08-2017 - 01:33 | 08-02-2013 - 20:55 | |
CVE-2012-6656 | 5.0 |
iconvdata/ibm930.c in GNU C Library (aka glibc) before 2.16 allows context-dependent attackers to cause a denial of service (out-of-bounds read) via a multibyte character value of "0xffff" to the iconv function when converting IBM930 encoded data to
|
01-07-2017 - 01:29 | 05-12-2014 - 16:59 | |
CVE-2013-4788 | 5.1 |
The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control e
|
01-07-2017 - 01:29 | 04-10-2013 - 17:55 | |
CVE-2012-4424 | 5.1 |
Stack-based buffer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string that triggers a
|
01-07-2017 - 01:29 | 09-10-2013 - 22:55 | |
CVE-2013-2207 | 2.6 |
pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file sys
|
01-07-2017 - 01:29 | 09-10-2013 - 22:55 |