CVE-2018-16429
- EPSS 0.46%
- Veröffentlicht 04.09.2018 00:29:01
- Zuletzt bearbeitet 21.11.2024 03:52:44
GNOME GLib 2.56.1 has an out-of-bounds read vulnerability in g_markup_parse_context_parse() in gmarkup.c, related to utf8_str().
CVE-2018-16428
- EPSS 0.69%
- Veröffentlicht 04.09.2018 00:29:01
- Zuletzt bearbeitet 21.11.2024 03:52:44
In GNOME GLib 2.56.1, g_markup_parse_context_end_parse() in gmarkup.c has a NULL pointer dereference.
- EPSS 0.49%
- Veröffentlicht 14.01.2012 17:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
GLib 2.31.8 and earlier, when the g_str_hash function is used, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via cr...
CVE-2009-3289
- EPSS 0.07%
- Veröffentlicht 22.09.2009 10:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions...
CVE-2008-4316
- EPSS 0.16%
- Veröffentlicht 14.03.2009 18:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.