Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnome glib 2.2.1 vulnerabilities and exploits
(subscribe to this query)
409
VMScore
CVE-2008-4316
Multiple integer overflows in glib/gbase64.c in GLib prior to 2.20 allow context-dependent malicious users to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.
Gnome Glib 2.14.5
Gnome Glib
Gnome Glib 2.16.3
Gnome Glib 2.14.6
Gnome Glib 2.2.1
445
VMScore
CVE-2012-0039
GLib 2.31.8 and previous versions, when the g_str_hash function is used, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent malicious users to cause a denial of service (CPU consumption) via crafted input to...
Gnome Glib 2.14.5
Gnome Glib 2.5.0
Gnome Glib 2.24.2
Gnome Glib 2.19.1
Gnome Glib 2.29.18
Gnome Glib 2.19.10
Gnome Glib 2.0.1
Gnome Glib 2.20.2
Gnome Glib 2.23.6
Gnome Glib 2.27.0
Gnome Glib 1.2.8
Gnome Glib 2.25.7
Gnome Glib 2.27.2
Gnome Glib 2.9.2
Gnome Glib 2.6.0
Gnome Glib 2.13.7
Gnome Glib 2.12.6
Gnome Glib 2.14.4
Gnome Glib 2.13.6
Gnome Glib 1.2.9
Gnome Glib 2.5.1
Gnome Glib 2.21.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
HTML injection
CVE-2024-35894
SQL
CVE-2024-5105
CVE-2014-100005
CVE-2024-35895
unauthorized
CVE-2024-22120
CVE-2024-35890
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started