The GNU C Library before 2.12.2 and EGLIBC allow context-dependent attackers to execute arbitrary code or cause a denial of service via a long UTF8 string in an fnmatch call
Reporter | Title | Published | Views | Family All 83 |
---|---|---|---|---|
![]() | Arbitrary Code Execution | 10 Apr 202000:55 | – | veracode |
![]() | CVE-2011-1659 | 8 Apr 201115:17 | – | nvd |
![]() | CVE-2011-1071 | 8 Apr 201115:17 | – | nvd |
![]() | Integer overflow | 8 Apr 201115:17 | – | prion |
![]() | Design/Logic Flaw | 8 Apr 201115:17 | – | prion |
![]() | F5 Networks BIG-IP : glibc vulnerability (SOL09408132) | 19 Aug 201600:00 | – | nessus |
![]() | SuSE 10 Security Update : glibc (ZYPP Patch Number 7574) | 13 Dec 201100:00 | – | nessus |
![]() | SuSE 10 Security Update : glibc (ZYPP Patch Number 7575) | 28 Jun 201100:00 | – | nessus |
![]() | SuSE9 Security Update : glibc (YOU Patch Number 12775) | 28 Jun 201100:00 | – | nessus |
![]() | Scientific Linux Security Update : glibc on SL5.x,SL6.x i386/x86_64 | 1 Aug 201200:00 | – | nessus |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo