Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
glibc vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2016-1234
Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) prior to 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent malicious users to cause a denial of service (crash) via a long name.
Gnu Glibc
Opensuse Leap 42.1
Opensuse Opensuse 13.2
Fedoraproject Fedora 23
5
CVSSv2
CVE-2014-8121
DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and previous versions does not properly check if a file is open, which allows remote malicious users to cause a denial of service (infinite loop) by performing a look-up...
Suse Suse Linux Enterprise Server 11.0
Suse Suse Linux Enterprise Desktop 11
Gnu Glibc
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
5
CVSSv2
CVE-2012-6656
iconvdata/ibm930.c in GNU C Library (aka glibc) prior to 2.16 allows context-dependent malicious users to cause a denial of service (out-of-bounds read) via a multibyte character value of "0xffff" to the iconv function when converting IBM930 encoded data to UTF-8.
Debian Debian Linux 7.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 10.04
Gnu Glibc
5
CVSSv2
CVE-2012-3404
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.12 and other versions does not properly calculate a buffer length, which allows context-dependent malicious users to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a de...
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 12.04
Redhat Enterprise Linux 6.0
Redhat Enterprise Virtualization 3.0
Canonical Ubuntu Linux 8.04
Gnu Glibc 2.12
5
CVSSv2
CVE-2012-3405
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and other versions does not properly calculate a buffer length, which allows context-dependent malicious users to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a de...
Gnu Glibc 2.14
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 12.04
Redhat Enterprise Linux 6.0
Redhat Enterprise Virtualization 3.0
5
CVSSv2
CVE-2013-4132
KDE-Workspace 4.10.5 and previous versions does not properly handle the return value of the glibc 2.17 crypt and pw_encrypt functions, which allows remote malicious users to cause a denial of service (NULL pointer dereference and crash) via (1) an invalid salt or a (2) DES or (3)...
Kde Kde Sc
Kde Kde-workspace
Opensuse Opensuse 12.2
5
CVSSv2
CVE-2011-4609
The svc_run function in the RPC implementation in glibc prior to 2.15 allows remote malicious users to cause a denial of service (CPU consumption) via a large number of RPC connections.
Gnu Glibc 2.0.3
Gnu Glibc 2.0.2
Gnu Glibc 2.0.1
Gnu Glibc 2.0
Gnu Glibc 2.1.9
Gnu Glibc 2.1.3
Gnu Glibc 2.1.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.1.1
Gnu Glibc 2.13
Gnu Glibc 2.0.6
Gnu Glibc 2.0.4
Gnu Glibc
Gnu Glibc 2.1
Gnu Glibc 2.0.5
5
CVSSv2
CVE-2013-0242
Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and previous versions, allows context-dependent malicious users to cause a denial of service (memory corruption and crash) via crafted multibyte characters.
Gnu Glibc 2.17
5
CVSSv2
CVE-2011-1659
Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and previous versions allows context-dependent malicious users to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted pattern argumen...
Gnu Glibc 2.2.2
Gnu Glibc 2.9
Gnu Glibc 2.7
Gnu Glibc 2.1.2
Gnu Glibc 2.11
Gnu Glibc 2.0.5
Gnu Glibc 2.2.5
Gnu Glibc 2.0.6
Gnu Glibc 2.10.1
Gnu Glibc 1.00
Gnu Glibc 1.06
Gnu Glibc 2.1.1
Gnu Glibc 1.02
Gnu Glibc 2.0.3
Gnu Glibc 1.07
Gnu Glibc 2.3.1
Gnu Glibc 2.3
Gnu Glibc 2.12.0
Gnu Glibc 2.0
Gnu Glibc
Gnu Glibc 2.1.1.6
Gnu Glibc 1.04
5
CVSSv2
CVE-2010-4051
The regcomp implementation in the GNU C Library (aka glibc or libc6) up to and including 2.11.3, and 2.12.x up to and including 2.12.2, allows context-dependent malicious users to cause a denial of service (application crash) via a regular expression containing adjacent bounded r...
Gnu Glibc 2.1.2
Gnu Glibc 2.11
Gnu Glibc 2.10.1
Gnu Glibc 1.00
Gnu Glibc 1.06
Gnu Glibc 2.1.1
Gnu Glibc 1.02
Gnu Glibc 1.07
Gnu Glibc 2.12.0
Gnu Glibc 2.1.1.6
Gnu Glibc 1.04
Gnu Glibc 1.01
Gnu Glibc 2.1
Gnu Glibc 1.09.1
Gnu Glibc 2.1.9
Gnu Glibc 2.12.1
Gnu Glibc 1.09
Gnu Glibc 2.10
Gnu Glibc 2.11.2
Gnu Glibc 1.03
Gnu Glibc 2.1.3.10
Gnu Glibc 2.11.3
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »