Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu gcc vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-1902
fold_binary in fold-const.c in GNU Compiler Collection (gcc) 4.1 improperly handles pointer overflow when folding a certain expr comparison to a corresponding offset comparison in cases other than EQ_EXPR and NE_EXPR, which might introduce buffer overflow vulnerabilities into app...
Gnu Gcc 4.1
5.5
CVSSv3
CVE-2022-27943
libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.
Gnu Gcc 11.2
Fedoraproject Fedora 36
7.5
CVSSv3
CVE-2019-15847
The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For exam...
Gnu Gcc
Opensuse Leap 15.0
Opensuse Leap 15.1
6.5
CVSSv3
CVE-2021-3826
Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows malicious users to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.
Gnu Gcc 11.2
Fedoraproject Fedora 35
Fedoraproject Fedora 36
Fedoraproject Fedora 37
NA
CVE-2009-3736
ltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 prior to 2.2.6b, as used in Ham Radio Control Libraries, Q, and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file.
Gnu Libtool 1.5.10
Gnu Libtool 1.5.12
Gnu Libtool 1.5.14
Gnu Libtool 1.5
Gnu Libtool 2.2.6a
Gnu Libtool 1.5.16
Gnu Libtool 1.5.18
Gnu Libtool 1.5.2
Gnu Libtool 1.5.4
Gnu Libtool 1.5.20
Gnu Libtool 1.5.22
Gnu Libtool 1.5.6
Gnu Libtool 1.5.8
Gnu Libtool 1.5.24
Gnu Libtool 1.5.26
7.8
CVSSv3
CVE-2016-4973
Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.
Gnu Libssp -
NA
CVE-2005-4808
Buffer overflow in reset_vars in config/tc-crx.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils prior to 20050714 allows user-assisted malicious users to have an unknown impact via a crafted .s file.
Gnu Binutils
Canonical Ubuntu Linux 5.10
NA
CVE-2006-3619
Directory traversal vulnerability in FastJar 0.93, as used in Gnu GCC 4.1.1 and previous versions, and 3.4.6 and previous versions, allows user-assisted malicious users to overwrite arbitrary files via a .jar file containing filenames with "../" sequences.
Fastjar Fastjar 0.93
7.5
CVSSv3
CVE-2020-29573
sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) prior to 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \x00\x04\x00\x0...
Gnu Glibc
Redhat Enterprise Linux 7.0
Netapp Cloud Backup -
Netapp Solidfire Baseboard Management Controller -
5.5
CVSSv3
CVE-2022-4285
An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.
Gnu Binutils
Fedoraproject Fedora 37
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
firewall
CVE-2024-35649
stored XSS
CVE-2022-28654
CVE-2020-35153
CVE-2024-27348
CVE-2022-28652
local users
CVE-2017-3506
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »