Vulnerability Database

With exploit

gnome / glib

Title Severity Exploit Date Affected Version
CVE-2021-27219 High Feb 15, 2021 < 2.66.6
>= 2.67.0 < 2.67.3
CVE-2020-35457 High Dec 15, 2020 < 2.65.3
CVE-2020-6750 Medium Jan 9, 2020 >= 2.60.0 <= 2.62.4
CVE-2019-13012 High Jun 28, 2019 >= 2.0.0 < 2.59.1
CVE-2019-12450 Critical May 29, 2019 >= 2.15.0 <= 2.61.1
CVE-2019-9633 Medium Mar 8, 2019 == 2.59.2
CVE-2018-16428 Critical Sep 4, 2018 == 2.56.1
CVE-2018-16429 High Sep 4, 2018 == 2.56.1
CVE-2012-0039 Medium Jan 14, 2012 == 2.14.5
== 2.5.0
== 2.24.2
== 2.19.1
== 2.29.18
== 2.19.10
== 2.0.1
== 2.20.2
== 2.23.6
== 2.27.0
== 1.2.8
== 2.25.7
== 2.27.2
== 2.9.2
== 2.6.0
== 2.13.7
== 2.12.6
== 2.14.4
== 2.13.6
== 1.2.9
== 2.5.1
== 2.21.0
== 2.27.5
== 2.7.1
== 2.12.3
== 2.17.0
== 2.3.3
== 2.14.0
== 2.3.6
== 2.1.0
== 2.12.8
== 2.20.1
== 2.15.5
== 2.4.5
== 1.3.9
== 2.30.0
== 2.25.14
== 2.12.7
== 2.25.9
== 2.28.7
== 2.31.2
== 2.16.0
== 2.6.6
== 2.16.2
== 2.9.3
== 2.4.0
== 2.7.5
== 2.19.7
== 2.11.0
== 2.0
== 2.19.8
== 2.4.4
== 2.1.5
== 1.1.12
== 2.7.4
== 2.5.4
== 2.9.5
== 2.29.90
== 2.27.90
== 2.15.1
== 2.27.4
== 2.30.2
== 2.22.5
== 2.28
== 2.15.4
== 2.31.6
== 2.19.9
== 1.2.5
== 2.10.1
== 2.6.4
== 2.5.3
== 1.1.12-1
== 2.25.4
== 2.1.2
== 1.2.0
== 2.3.4
== 2.10.2
== 2.31.4
== 2.8.5
== 2.11.1
== 1.2.6
== 2.19.0
== 1.3.13
== 2.29.14
== 2.17.4
== 2.6.3
== 2.17.7
== 2.22.0
== 2.12.11
== 2.0.5
== 2.12.12
== 2.12.1
== 2.29.16
== 2.8.2
== 2.19.3
== 2.21.2
== 1.2.3
== 2.12.5
== 2.17.3
== 2.14.3
== 2.11.4
== 2.25.2
== 2.30.1
== 2.21.4
== 2.1.4
== 2.4.8
== 2.26.1
== 2.17.6
== 2.16.3
== 2.28.2
== 1.3.10
== 2.16.6
== 2.17.1
== 2.13.2
== 2.10.3
== 2.12.4
== 2.23.0
== 2.25.11
== 2.28.0
== 2.25.15
== 2.15.0
== 2.7.0
== 2.18.4
== 2.28.5
== 2.24.0
== 2.10.0
== 2.0.6
== 2.13.1
== 2.16.1
== 2.28.4
== 2.19.4
== 2.19.2
== 2.18.2
== 2.8.0
== 2.7.2
== 2.6.5
== 2.15.6
== 2.13.0
== 2.16.4
== 1.1.15
== 2.6.1
== 2.21.5
== 2.19.5
== 2.15.2
== 2.3.2
== 2.28.6
== 2.8.1
== 2.27.92
== 2.25.12
== 2.23.4
== 2.25.17
== 2.25.3
== 1.3.11
== 2.4.2
== 2.14.6
== 2.23.3
== 2.4.7
== 2.2.3
== 2.20.4
== 2.0.0
== 2.23.5
== 2.27.93
== 2.29.10
== 1.3.14
== 2.22.3
== 2.24.1
== 2.15.3
== 2.7.6
== 2.1.3
== 2.7.7
== 2.1.1
== 2.12.13
== 2.13.5
== 2.22.4
== 2.18.3
== 2.16.5
== 1.3.15
== 2.25.1
== 2.13.3
== 2.7.3
== 2.19.6
== 2.29.2
== 2.3.5
== 2.4.1
== 1.2.2
== 2.9.4
== 2.28.3
== 2.25.8
== 2.21.1
== 2.29.4
== 2.8.3
== 2.14.1
== 2.3.0
== 2.27.1
== 2.2.1
== 2.0.7
== 2.11.2
== 2.0.2
== 2.25.10
== 2.29.8
== 1.2.10
== 2.5.6
== 2.8.4
== 2.4.3
== 2.12.2
== 2.21.6
== 2.9.6
== 2.0.3
== 2.9.1
== 2.5.2
== 2.31.0
== 2.9.0
== 2.6.2
== 2.27.91
== 2.4.6
== 2.29.92
== 2.3.1
== 2.21.3
== 2.5.5
== 1.2.1
== 2.0.4
== 2.2.2
== 1.2.7
== 2.27.3
== 1.3.12
== 2.20.3
== 1.2.4
== 2.11.3
== 2.22.2
== 2.25.5
== 2.26.0
== 2.23.2
== 2.29.6
== 2.8.6
== 2.25.6
== 2.29.12
== 2.23.1
== 2.5.7
== 2.25.0
== 2.28.8
== 2.18.0
== 2.12.0
== 2.20.0
== 2.17.5
== 2.25.13
== 2.2.0
<= 2.31.8
== 2.12.9
== 2.22.1
== 2.17.2
== 2.18.1
== 2.12.10
== 2.20.5
== 2.14.2
== 2.28.1
== 2.13.4
== 2.25.16
CVE-2009-3289 High Sep 22, 2009 == 2.0