Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu glibc 2.16 vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2012-3480
Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified "related functions" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute ar...
Gnu Glibc 2.16
1 EDB exploit
7.5
CVSSv2
CVE-2012-4412
Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and previous versions allows context-dependent malicious users to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overf...
Gnu Glibc 2.12.2
Gnu Glibc 2.12.1
Gnu Glibc 2.1.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.0.2
Gnu Glibc 2.0.1
Gnu Glibc 2.15
Gnu Glibc 2.14.1
Gnu Glibc 2.11.1
Gnu Glibc 2.11
Gnu Glibc 2.10.1
Gnu Glibc 2.0.6
Gnu Glibc 2.0.5
Gnu Glibc
Gnu Glibc 2.16
Gnu Glibc 2.11.3
Gnu Glibc 2.11.2
Gnu Glibc 2.1.1
Gnu Glibc 2.1
Gnu Glibc 2.0
Gnu Glibc 2.14
Gnu Glibc 2.13
1 EDB exploit
5.1
CVSSv2
CVE-2012-4424
Stack-based buffer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and previous versions allows context-dependent malicious users to cause a denial of service (crash) or possibly execute arbitrary code via a long string that triggers a malloc failure...
Gnu Glibc 2.15
Gnu Glibc 2.14.1
Gnu Glibc 2.14
Gnu Glibc 2.11
Gnu Glibc 2.10.1
Gnu Glibc 2.0.6
Gnu Glibc 2.0.5
Gnu Glibc 2.13
Gnu Glibc 2.12.2
Gnu Glibc 2.1.9
Gnu Glibc 2.1.3
Gnu Glibc 2.0.4
Gnu Glibc 2.0.3
Gnu Glibc 2.12.1
Gnu Glibc 2.11.3
Gnu Glibc 2.1.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.0.2
Gnu Glibc 2.0.1
Gnu Glibc
Gnu Glibc 2.16
Gnu Glibc 2.11.2
5.1
CVSSv2
CVE-2013-4788
The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and previous versions, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent malicious users to control execution flow ...
Gnu Glibc
Gnu Glibc 2.11.3
Gnu Glibc 2.11.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.1.1
Gnu Glibc 2.0.1
Gnu Glibc 2.0
Gnu Glibc 2.14.1
Gnu Glibc 2.14
Gnu Glibc 2.10.1
Gnu Glibc 2.1.9
Gnu Glibc 2.0.5
Gnu Glibc 2.0.4
Gnu Glibc 2.13
Gnu Glibc 2.12.2
Gnu Glibc 2.12.1
Gnu Glibc 2.1.3
Gnu Glibc 2.1.2
Gnu Glibc 2.0.3
Gnu Glibc 2.0.2
Gnu Glibc 2.16
Gnu Glibc 2.15
1 EDB exploit
2.6
CVSSv2
CVE-2013-2207
pt_chown in GNU C Library (aka glibc or libc6) prior to 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.
Gnu Glibc 2.14
Gnu Glibc
Gnu Glibc 2.16
Gnu Glibc 2.11.2
Gnu Glibc 2.11.1
Gnu Glibc 2.1.1
Gnu Glibc 2.1
Gnu Glibc 2.0
Gnu Glibc 2.12.2
Gnu Glibc 2.12.1
Gnu Glibc 2.11.3
Gnu Glibc 2.1.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.0.2
Gnu Glibc 2.0.1
Gnu Glibc 2.13
Gnu Glibc 2.1.9
Gnu Glibc 2.1.3
Gnu Glibc 2.0.4
Gnu Glibc 2.0.3
Gnu Glibc 2.15
Gnu Glibc 2.14.1
5
CVSSv2
CVE-2012-6656
iconvdata/ibm930.c in GNU C Library (aka glibc) prior to 2.16 allows context-dependent malicious users to cause a denial of service (out-of-bounds read) via a multibyte character value of "0xffff" to the iconv function when converting IBM930 encoded data to UTF-8.
Debian Debian Linux 7.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 10.04
Gnu Glibc
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started