Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu libidn vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2017-14062
Integer overflow in the decode_digit function in puny_decode.c in Libidn2 prior to 2.0.4 allows remote malicious users to cause a denial of service or possibly have unspecified other impact.
Gnu Libidn2
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
446
VMScore
CVE-2016-6261
The idna_to_ascii_4i function in lib/idna.c in libidn prior to 1.33 allows context-dependent malicious users to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.
Opensuse Leap 42.1
Gnu Libidn
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
668
VMScore
CVE-2015-2059
The stringprep_utf8_to_ucs4 function in libin prior to 1.31, as used in jabberd2, allows context-dependent malicious users to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.
Gnu Libidn
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Fedoraproject Fedora 22
Fedoraproject Fedora 21
694
VMScore
CVE-2014-9402
The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) prior to 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote malicious users to cause a denial of service (infinite loop) by sending a positive answer while a network...
Gnu Glibc
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
668
VMScore
CVE-2014-4043
The posix_spawn_file_actions_addopen function in glibc prior to 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent malicious users to trigger use-after-free vulnerabilities.
Gnu Glibc
Opensuse Opensuse 13.1
1 Github repository
605
VMScore
CVE-2012-3406
The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not "properly restrict the use of" the alloca function when allocating the SPECS array, which allows context-dependent malicious users to bypass the...
Canonical Ubuntu Linux 8.04
Redhat Enterprise Linux 6.0
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Redhat Enterprise Virtualization 3.0
Redhat Enterprise Linux 5
Canonical Ubuntu Linux 12.04
Gnu Glibc 2.5
Canonical Ubuntu Linux 10.04
Gnu Glibc 2.12
445
VMScore
CVE-2012-3404
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.12 and other versions does not properly calculate a buffer length, which allows context-dependent malicious users to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a de...
Canonical Ubuntu Linux 8.04
Redhat Enterprise Linux 6.0
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Redhat Enterprise Virtualization 3.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
Gnu Glibc 2.12
445
VMScore
CVE-2012-3405
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and other versions does not properly calculate a buffer length, which allows context-dependent malicious users to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a de...
Canonical Ubuntu Linux 8.04
Redhat Enterprise Linux 6.0
Gnu Glibc 2.14
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Redhat Enterprise Virtualization 3.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
CVE-2012-1823
memory leak
CVE-2024-0627
CVE-2024-31402
privilege escalation
CVE-2024-36418
remote code execution
CVE-2024-27844
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started