Vulnerabilities

Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.

Filtering: Tag: glibc Clear
ID Title
CVE-2024-33599 Vulnerability in gnu (CVE-2024-33599)
vulnerability in gnu (CVE-2024-33599). Successful exploitation can lead to full system takeover.
CVE-2024-33601 Vulnerability in dos (CVE-2024-33601)
vulnerability in dos (CVE-2024-33601). Risk of unauthorized operations or information disclosure.
CVE-2024-33600 Vulnerability in gnu (CVE-2024-33600)
vulnerability in gnu (CVE-2024-33600). Risk of unauthorized operations or information disclosure.
CVE-2024-33602 Vulnerability in gnu (CVE-2024-33602)
vulnerability in gnu (CVE-2024-33602). Successful exploitation can lead to full system takeover.
CVE-2024-2961 Out-of-Bounds Write in c (CVE-2024-2961)
out-of-bounds write in c (CVE-2024-2961). Risk of unauthorized operations or information disclosure.
CVE-2023-6246 Vulnerability in privilege-escalation (CVE-2023-6246)
vulnerability in privilege-escalation (CVE-2023-6246). Successful exploitation can lead to full system takeover.
CVE-2023-6779 Vulnerability in gnu (CVE-2023-6779)
vulnerability in gnu (CVE-2023-6779). Risk of unauthorized operations or information disclosure.
CVE-2023-6780 Vulnerability in gnu (CVE-2023-6780)
vulnerability in gnu (CVE-2023-6780). Risk of unauthorized operations or information disclosure.
CVE-2023-4911 KEV [KEV] Vulnerability in Gnu c (CVE-2023-4911)
vulnerability in Gnu c (CVE-2023-4911). Successful exploitation can lead to full system takeover. Listed in CISA KEV — actively exploited.
CVE-2023-4527 Vulnerability in gnu (CVE-2023-4527)
vulnerability in gnu (CVE-2023-4527). Risk of unauthorized operations or information disclosure.
CVE-2023-4806 Use-After-Free in gnu (CVE-2023-4806)
vulnerability in gnu (CVE-2023-4806). Risk of unauthorized operations or information disclosure.
CVE-2017-16997 Vulnerability in c (CVE-2017-16997)
vulnerability in c (CVE-2017-16997). Successful exploitation can lead to full system takeover.
CVE-2017-17426 Vulnerability in c (CVE-2017-17426)
vulnerability in c (CVE-2017-17426). Successful exploitation can lead to full system takeover.
CVE-2017-15804 Buffer Overflow in c (CVE-2017-15804)
vulnerability in c (CVE-2017-15804). Successful exploitation can lead to full system takeover.
CVE-2017-15670 Buffer Overflow in c (CVE-2017-15670)
vulnerability in c (CVE-2017-15670). Successful exploitation can lead to full system takeover.
CVE-2017-15671 Vulnerability in c (CVE-2017-15671)
vulnerability in c (CVE-2017-15671). Risk of unauthorized operations or information disclosure.
CVE-2011-5320 Buffer Overflow in dos (CVE-2011-5320)
vulnerability in dos (CVE-2011-5320). Risk of unauthorized operations or information disclosure.
CVE-2017-12133 Use-After-Free in c (CVE-2017-12133)
vulnerability in c (CVE-2017-12133). Data can be tampered with by attackers.
CVE-2017-12132 Vulnerability in c (CVE-2017-12132)
vulnerability in c (CVE-2017-12132). Data can be tampered with by attackers.
CVE-2015-5180 Vulnerability in dos (CVE-2015-5180)
vulnerability in dos (CVE-2015-5180). Risk of unauthorized operations or information disclosure.
CVE-2017-1000366 Buffer Overflow in redhat (CVE-2017-1000366)
vulnerability in redhat (CVE-2017-1000366). Successful exploitation can lead to full system takeover.
CVE-2014-9984 Buffer Overflow in c (CVE-2014-9984)
vulnerability in c (CVE-2014-9984). Successful exploitation can lead to full system takeover.
CVE-2017-8804 Unsafe Deserialization in c (CVE-2017-8804)
vulnerability in c (CVE-2017-8804). Risk of unauthorized operations or information disclosure.
CVE-2015-8983 Vulnerability in c (CVE-2015-8983)
vulnerability in c (CVE-2015-8983). Successful exploitation can lead to full system takeover.
CVE-2015-8984 Out-of-Bounds Read in c (CVE-2015-8984)
vulnerability in c (CVE-2015-8984). Risk of unauthorized operations or information disclosure.
CVE-2015-8985 Vulnerability in c (CVE-2015-8985)
vulnerability in c (CVE-2015-8985). Risk of unauthorized operations or information disclosure.
CVE-2015-8982 Vulnerability in c (CVE-2015-8982)
vulnerability in c (CVE-2015-8982). Successful exploitation can lead to full system takeover.
CVE-2016-10228 Vulnerability in c (CVE-2016-10228)
vulnerability in c (CVE-2016-10228). Risk of unauthorized operations or information disclosure.
CVE-2016-5417 Vulnerability in c (CVE-2016-5417)
vulnerability in c (CVE-2016-5417). Risk of unauthorized operations or information disclosure.

🍪 About cookies

We use cookies to keep you logged in, remember your language, and improve the service.

Details →