Количество 11
Количество 11

BDU:2024-08615
Уязвимость библиотеки структурированных файлов GNOME Project G libgsf, связанная с целочисленным переполнением, позволяющая нарушителю выполнить произвольный код

CVE-2024-36474
An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

CVE-2024-36474
An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

CVE-2024-36474
An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
CVE-2024-36474
An integer overflow vulnerability exists in the Compound Document Bina ...
GHSA-7m28-hv5x-hp65
An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

SUSE-SU-2024:3922-1
Security update for libgsf

SUSE-SU-2024:3921-1
Security update for libgsf

SUSE-SU-2024:3920-1
Security update for libgsf

ROS-20241021-02
Множественные уязвимости libgsf

SUSE-SU-2024:3770-1
Security update for libgsf
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2024-08615 Уязвимость библиотеки структурированных файлов GNOME Project G libgsf, связанная с целочисленным переполнением, позволяющая нарушителю выполнить произвольный код | CVSS3: 7.8 | 0% Низкий | 10 месяцев назад |
![]() | CVE-2024-36474 An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. | CVSS3: 8.4 | 0% Низкий | 9 месяцев назад |
![]() | CVE-2024-36474 An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. | CVSS3: 8.4 | 0% Низкий | 9 месяцев назад |
![]() | CVE-2024-36474 An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. | CVSS3: 8.4 | 0% Низкий | 9 месяцев назад |
CVE-2024-36474 An integer overflow vulnerability exists in the Compound Document Bina ... | CVSS3: 8.4 | 0% Низкий | 9 месяцев назад | |
GHSA-7m28-hv5x-hp65 An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. | CVSS3: 8.4 | 0% Низкий | 9 месяцев назад | |
![]() | SUSE-SU-2024:3922-1 Security update for libgsf | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3921-1 Security update for libgsf | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3920-1 Security update for libgsf | 8 месяцев назад | ||
![]() | ROS-20241021-02 Множественные уязвимости libgsf | CVSS3: 7.8 | 8 месяцев назад | |
![]() | SUSE-SU-2024:3770-1 Security update for libgsf | 8 месяцев назад |
Уязвимостей на страницу