CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
86259 | CVE-2015-8982 | Candidate | Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc6) before 2.21 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow. | Assigned (20170214) | None (candidate not yet proposed) | View | |
86260 | CVE-2015-8983 | Candidate | Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to computing a size in bytes, which triggers a heap-based buffer overflow. | Assigned (20170214) | None (candidate not yet proposed) | View | |
86261 | CVE-2015-8984 | Candidate | The fnmatch function in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash) via a malformed pattern, which triggers an out-of-bounds read. | Assigned (20170214) | None (candidate not yet proposed) | View | |
86262 | CVE-2015-8985 | Candidate | The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing. | Assigned (20170214) | None (candidate not yet proposed) | View | |
102809 | CVE-2017-5989 | Candidate | ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. | Assigned (20170215) | None (candidate not yet proposed) | View |
Page 19943 of 20943, showing 5 records out of 104715 total, starting on record 99711, ending on 99715