Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2024-33599 |
|
Vulnerability in gnu (CVE-2024-33599)
vulnerability in gnu (CVE-2024-33599). Successful exploitation can lead to full system takeover.
|
| CVE-2024-33601 |
|
Vulnerability in dos (CVE-2024-33601)
vulnerability in dos (CVE-2024-33601). Risk of unauthorized operations or information disclosure.
|
| CVE-2024-33600 |
|
Vulnerability in gnu (CVE-2024-33600)
vulnerability in gnu (CVE-2024-33600). Risk of unauthorized operations or information disclosure.
|
| CVE-2024-33602 |
|
Vulnerability in gnu (CVE-2024-33602)
vulnerability in gnu (CVE-2024-33602). Successful exploitation can lead to full system takeover.
|
| CVE-2024-2961 |
|
Out-of-Bounds Write in c (CVE-2024-2961)
out-of-bounds write in c (CVE-2024-2961). Risk of unauthorized operations or information disclosure.
|
| CVE-2023-6246 |
|
Vulnerability in privilege-escalation (CVE-2023-6246)
vulnerability in privilege-escalation (CVE-2023-6246). Successful exploitation can lead to full system takeover.
|
| CVE-2023-6779 |
|
Vulnerability in gnu (CVE-2023-6779)
vulnerability in gnu (CVE-2023-6779). Risk of unauthorized operations or information disclosure.
|
| CVE-2023-6780 |
|
Vulnerability in gnu (CVE-2023-6780)
vulnerability in gnu (CVE-2023-6780). Risk of unauthorized operations or information disclosure.
|
| CVE-2023-4911 KEV |
|
[KEV] Vulnerability in Gnu c (CVE-2023-4911)
vulnerability in Gnu c (CVE-2023-4911). Successful exploitation can lead to full system takeover. Listed in CISA KEV — actively exploited.
|
| CVE-2023-4527 |
|
Vulnerability in gnu (CVE-2023-4527)
vulnerability in gnu (CVE-2023-4527). Risk of unauthorized operations or information disclosure.
|
| CVE-2023-4806 |
|
Use-After-Free in gnu (CVE-2023-4806)
vulnerability in gnu (CVE-2023-4806). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-16997 |
|
Vulnerability in c (CVE-2017-16997)
vulnerability in c (CVE-2017-16997). Successful exploitation can lead to full system takeover.
|
| CVE-2017-17426 |
|
Vulnerability in c (CVE-2017-17426)
vulnerability in c (CVE-2017-17426). Successful exploitation can lead to full system takeover.
|
| CVE-2017-15804 |
|
Buffer Overflow in c (CVE-2017-15804)
vulnerability in c (CVE-2017-15804). Successful exploitation can lead to full system takeover.
|
| CVE-2017-15670 |
|
Buffer Overflow in c (CVE-2017-15670)
vulnerability in c (CVE-2017-15670). Successful exploitation can lead to full system takeover.
|
| CVE-2017-15671 |
|
Vulnerability in c (CVE-2017-15671)
vulnerability in c (CVE-2017-15671). Risk of unauthorized operations or information disclosure.
|
| CVE-2011-5320 |
|
Buffer Overflow in dos (CVE-2011-5320)
vulnerability in dos (CVE-2011-5320). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-12133 |
|
Use-After-Free in c (CVE-2017-12133)
vulnerability in c (CVE-2017-12133). Data can be tampered with by attackers.
|
| CVE-2017-12132 |
|
Vulnerability in c (CVE-2017-12132)
vulnerability in c (CVE-2017-12132). Data can be tampered with by attackers.
|
| CVE-2015-5180 |
|
Vulnerability in dos (CVE-2015-5180)
vulnerability in dos (CVE-2015-5180). Risk of unauthorized operations or information disclosure.
|
| CVE-2017-1000366 |
|
Buffer Overflow in redhat (CVE-2017-1000366)
vulnerability in redhat (CVE-2017-1000366). Successful exploitation can lead to full system takeover.
|
| CVE-2014-9984 |
|
Buffer Overflow in c (CVE-2014-9984)
vulnerability in c (CVE-2014-9984). Successful exploitation can lead to full system takeover.
|
| CVE-2017-8804 |
|
Unsafe Deserialization in c (CVE-2017-8804)
vulnerability in c (CVE-2017-8804). Risk of unauthorized operations or information disclosure.
|
| CVE-2015-8983 |
|
Vulnerability in c (CVE-2015-8983)
vulnerability in c (CVE-2015-8983). Successful exploitation can lead to full system takeover.
|
| CVE-2015-8984 |
|
Out-of-Bounds Read in c (CVE-2015-8984)
vulnerability in c (CVE-2015-8984). Risk of unauthorized operations or information disclosure.
|
| CVE-2015-8985 |
|
Vulnerability in c (CVE-2015-8985)
vulnerability in c (CVE-2015-8985). Risk of unauthorized operations or information disclosure.
|
| CVE-2015-8982 |
|
Vulnerability in c (CVE-2015-8982)
vulnerability in c (CVE-2015-8982). Successful exploitation can lead to full system takeover.
|
| CVE-2016-10228 |
|
Vulnerability in c (CVE-2016-10228)
vulnerability in c (CVE-2016-10228). Risk of unauthorized operations or information disclosure.
|
| CVE-2016-5417 |
|
Vulnerability in c (CVE-2016-5417)
vulnerability in c (CVE-2016-5417). Risk of unauthorized operations or information disclosure.
|