Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu gcc vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2008-1367
gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong dir...
Gnu Gcc 4.3
4.3
CVSSv2
CVE-2022-27943
libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.
Gnu Gcc 11.2
Fedoraproject Fedora 36
5
CVSSv2
CVE-2019-15847
The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For exam...
Gnu Gcc
Opensuse Leap 15.0
Opensuse Leap 15.1
NA
CVE-2021-3826
Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows malicious users to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.
Gnu Gcc 11.2
Fedoraproject Fedora 35
Fedoraproject Fedora 36
Fedoraproject Fedora 37
6.9
CVSSv2
CVE-2009-3736
ltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 prior to 2.2.6b, as used in Ham Radio Control Libraries, Q, and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file.
Gnu Libtool 1.5.10
Gnu Libtool 1.5.12
Gnu Libtool 1.5.14
Gnu Libtool 1.5
Gnu Libtool 2.2.6a
Gnu Libtool 1.5.16
Gnu Libtool 1.5.18
Gnu Libtool 1.5.2
Gnu Libtool 1.5.4
Gnu Libtool 1.5.20
Gnu Libtool 1.5.22
Gnu Libtool 1.5.6
Gnu Libtool 1.5.8
Gnu Libtool 1.5.24
Gnu Libtool 1.5.26
4.6
CVSSv2
CVE-2016-4973
Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.
Gnu Libssp -
7.6
CVSSv2
CVE-2005-4808
Buffer overflow in reset_vars in config/tc-crx.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils prior to 20050714 allows user-assisted malicious users to have an unknown impact via a crafted .s file.
Gnu Binutils
Canonical Ubuntu Linux 5.10
5
CVSSv2
CVE-2020-29573
sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) prior to 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \x00\x04\x00\x0...
Gnu Glibc
Redhat Enterprise Linux 7.0
Netapp Cloud Backup -
Netapp Solidfire Baseboard Management Controller -
2.6
CVSSv2
CVE-2006-3619
Directory traversal vulnerability in FastJar 0.93, as used in Gnu GCC 4.1.1 and previous versions, and 3.4.6 and previous versions, allows user-assisted malicious users to overwrite arbitrary files via a .jar file containing filenames with "../" sequences.
Fastjar Fastjar 0.93
NA
CVE-2022-4285
An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.
Gnu Binutils
Fedoraproject Fedora 37
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4946
CVE-2024-30309
CVE-2024-4761
CVE-2024-30051
type confusion
memory leak
CVE-2024-30293
reflected XSS
CVE-2024-3126
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »