Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnome glib 2.2.1 vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2008-4316
Multiple integer overflows in glib/gbase64.c in GLib prior to 2.20 allow context-dependent malicious users to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.
Gnome Glib 2.14.5
Gnome Glib
Gnome Glib 2.16.3
Gnome Glib 2.14.6
Gnome Glib 2.2.1
5
CVSSv2
CVE-2012-0039
GLib 2.31.8 and previous versions, when the g_str_hash function is used, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent malicious users to cause a denial of service (CPU consumption) via crafted input to...
Gnome Glib 2.14.5
Gnome Glib 2.5.0
Gnome Glib 2.24.2
Gnome Glib 2.19.1
Gnome Glib 2.29.18
Gnome Glib 2.19.10
Gnome Glib 2.0.1
Gnome Glib 2.20.2
Gnome Glib 2.23.6
Gnome Glib 2.27.0
Gnome Glib 1.2.8
Gnome Glib 2.25.7
Gnome Glib 2.27.2
Gnome Glib 2.9.2
Gnome Glib 2.6.0
Gnome Glib 2.13.7
Gnome Glib 2.12.6
Gnome Glib 2.14.4
Gnome Glib 2.13.6
Gnome Glib 1.2.9
Gnome Glib 2.5.1
Gnome Glib 2.21.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
cross-site request forgery
unauthorized
CVE-2024-33925
reflected XSS
CVE-2023-51580
CVE-2023-51579
CVE-2015-2051
CVE-2023-51609
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started