Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
glib vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv3
CVE-2019-9633
gio/gsocketclient.c in GNOME GLib 2.59.2 does not ensure that a parent GTask remains alive during the execution of a connection-attempting enumeration, which allows remote malicious users to cause a denial of service (g_socket_client_connected_callback mishandling and application...
Gnome Glib 2.59.2
NA
CVE-2010-1172
DBus-GLib 0.73 disregards the access flag of exported GObject properties, which allows local users to bypass intended access restrictions and possibly cause a denial of service by modifying properties, as demonstrated by properties of the (1) DeviceKit-Power, (2) NetworkManager, ...
Freedesktop Dbus-glib 0.73
5.9
CVSSv3
CVE-2020-6750
GSocketClient in GNOME GLib up to and including 2.62.4 may occasionally connect directly to a target address instead of connecting via a proxy server when configured to do so, because the proxy_addr field is mishandled. This bug is timing-dependent and may occur only sporadically...
Gnome Glib
Fedoraproject Fedora 30
Fedoraproject Fedora 31
5.5
CVSSv3
CVE-2021-3800
A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.
Gnome Glib
Debian Debian Linux 10.0
Netapp Active Iq Unified Manager -
7.8
CVSSv3
CVE-2009-3289
The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.
Gnome Glib 2.0
Opensuse Opensuse 11.1
Opensuse Opensuse 11.0
Suse Suse Linux Enterprise Server 11
5.3
CVSSv3
CVE-2021-28153
An issue exists in GNOME GLib prior to 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevanc...
Gnome Glib
Debian Debian Linux 9.0
Fedoraproject Fedora 33
Broadcom Brocade Fabric Operating System Firmware -
9.8
CVSSv3
CVE-2018-16428
In GNOME GLib 2.56.1, g_markup_parse_context_end_parse() in gmarkup.c has a NULL pointer dereference.
Gnome Glib 2.56.1
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
7.5
CVSSv3
CVE-2018-16429
GNOME GLib 2.56.1 has an out-of-bounds read vulnerability in g_markup_parse_context_parse() in gmarkup.c, related to utf8_str().
Gnome Glib 2.56.1
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 18.04
7.5
CVSSv3
CVE-2021-27218
An issue exists in GNOME GLib prior to 2.66.7 and 2.67.x prior to 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
Gnome Glib
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Debian Debian Linux 9.0
Netapp Cloud Backup -
Netapp Active Iq Unified Manager -
Netapp E-series Performance Analyzer -
Broadcom Brocade Fabric Operating System Firmware -
7.5
CVSSv3
CVE-2021-27219
An issue exists in GNOME GLib prior to 2.66.6 and 2.67.x prior to 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.
Gnome Glib
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Debian Debian Linux 9.0
Netapp Cloud Backup -
Netapp Active Iq Unified Manager -
Netapp E-series Performance Analyzer -
Broadcom Brocade Fabric Operating System Firmware -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7028
memory leak
log injection
CVE-2024-3400
CVE-2022-48695
CVE-2022-48675
CVE-2024-34487
CVE-2024-33792
spoof
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »