Логотип exploitDog
bind:"CVE-2021-3800" OR bind:"CVE-2021-28153"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2021-3800" OR bind:"CVE-2021-28153"

Количество 23

Количество 23

oracle-oval логотип

ELSA-2021-4385

почти 4 года назад

ELSA-2021-4385: glib2 security and bug fix update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2021-3800

около 3 лет назад

A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2021-3800

больше 4 лет назад

A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2021-3800

около 3 лет назад

A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.

CVSS3: 5.5
EPSS: Низкий
msrc логотип

CVE-2021-3800

около 3 лет назад

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2021-3800

около 3 лет назад

A flaw was found in glib before version 2.63.6. Due to random charset ...

CVSS3: 5.5
EPSS: Низкий
ubuntu логотип

CVE-2021-28153

больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2021-28153

больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2021-28153

больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2021-28153

больше 4 лет назад

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2021-28153

больше 4 лет назад

An issue was discovered in GNOME GLib before 2.66.8. When g_file_repla ...

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0828-1

больше 3 лет назад

Security update for glib2

EPSS: Низкий
github логотип

GHSA-58w9-h6f7-f979

около 3 лет назад

A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2024-07303

больше 5 лет назад

Уязвимость набора библиотек GLib, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0174-1

больше 2 лет назад

Security update for glib2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:1758-2

почти 3 года назад

Security update for glib2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:1758-1

больше 3 лет назад

Security update for glib2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:1455-2

больше 2 лет назад

Security update for glib2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:1455-1

больше 3 лет назад

Security update for glib2

EPSS: Низкий
github логотип

GHSA-9hh6-p5c5-mmmf

больше 3 лет назад

An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2021-4385

ELSA-2021-4385: glib2 security and bug fix update (MODERATE)

почти 4 года назад
ubuntu логотип
CVE-2021-3800

A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.

CVSS3: 5.5
0%
Низкий
около 3 лет назад
redhat логотип
CVE-2021-3800

A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.

CVSS3: 5.5
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-3800

A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.

CVSS3: 5.5
0%
Низкий
около 3 лет назад
msrc логотип
CVSS3: 5.5
0%
Низкий
около 3 лет назад
debian логотип
CVE-2021-3800

A flaw was found in glib before version 2.63.6. Due to random charset ...

CVSS3: 5.5
0%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2021-28153

An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)

CVSS3: 5.3
0%
Низкий
больше 4 лет назад
redhat логотип
CVE-2021-28153

An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)

CVSS3: 5.3
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-28153

An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)

CVSS3: 5.3
0%
Низкий
больше 4 лет назад
msrc логотип
CVSS3: 5.3
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-28153

An issue was discovered in GNOME GLib before 2.66.8. When g_file_repla ...

CVSS3: 5.3
0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2022:0828-1

Security update for glib2

0%
Низкий
больше 3 лет назад
github логотип
GHSA-58w9-h6f7-f979

A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.

CVSS3: 7.5
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2024-07303

Уязвимость набора библиотек GLib, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 5.5
0%
Низкий
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2023:0174-1

Security update for glib2

0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:1758-2

Security update for glib2

0%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:1758-1

Security update for glib2

0%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:1455-2

Security update for glib2

0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:1455-1

Security update for glib2

0%
Низкий
больше 3 лет назад
github логотип
GHSA-9hh6-p5c5-mmmf

An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)

CVSS3: 5.3
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу