cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-6780,https://securityvulnerability.io/vulnerability/CVE-2023-6780,Glibc: integer overflow in __vsyslog_internal(),"An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size to store the message, resulting in undefined behavior. This issue affects glibc 2.37 and newer.",Red Hat,"Glibc,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora",5.3,MEDIUM,0.0021899999119341373,false,,false,false,false,,,false,false,,2024-01-31T14:08:02.610Z,0 CVE-2023-6779,https://securityvulnerability.io/vulnerability/CVE-2023-6779,Glibc: off-by-one heap-based buffer overflow in __vsyslog_internal(),"An off-by-one heap-based buffer overflow was identified in the __vsyslog_internal function within the glibc library. When the syslog and vsyslog functions are invoked with a message exceeding INT_MAX bytes, it leads to improper calculations of the buffer size allocated for the message. This flaw may cause application crashes and can potentially be exploited if the affected functions are manipulated. The vulnerability impacts glibc versions 2.37 and newer, necessitating immediate attention from system administrators and software developers utilizing this library.",Red Hat,"Glibc,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora",8.2,HIGH,0.003019999945536256,false,,true,false,false,,,false,false,,2024-01-31T14:07:41.967Z,0 CVE-2023-6246,https://securityvulnerability.io/vulnerability/CVE-2023-6246,Heap-Based Buffer Overflow Vulnerability in glibc Library,"A heap-based buffer overflow vulnerability exists in the __vsyslog_internal function of the glibc library, which is crucial for logging system events through the syslog and vsyslog functionalities. The issue arises if the openlog function is not invoked or if it is invoked with a NULL ident argument, particularly when the program name exceeds 1024 bytes. This can lead to significant consequences, including application crashes and the potential for local privilege escalation, impacting systems using glibc version 2.36 and onward.",Red Hat,"Glibc,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora",8.4,HIGH,0.015080000273883343,false,,true,true,true,2024-04-28T16:33:20.000Z,,true,false,,2024-01-31T14:06:21.949Z,8944 CVE-2020-1751,https://securityvulnerability.io/vulnerability/CVE-2020-1751,Out-of-Bounds Write Vulnerability in glibc Affecting PowerPC Systems,"An out-of-bounds write vulnerability has been detected in glibc prior to version 2.31 that affects PowerPC architectures. In particular, the backtrace function fails to properly validate array bounds while saving frame addresses. This flaw can lead to denial of service and opens the door for potential code execution, posing a significant threat to system availability and stability. Systems utilizing vulnerable versions of glibc are at risk and should be updated promptly.",Red Hat,Glibc,5.1,MEDIUM,0.0006300000241026282,false,,false,false,false,,,false,false,,2020-04-17T18:32:44.000Z,0