Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
glibc vulnerabilities and exploits
(subscribe to this query)
5.9
CVSSv3
CVE-2016-4429
Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.
Opensuse Leap 42.1
Opensuse Opensuse 13.2
Gnu Glibc
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 18.04
1 Article
NA
CVE-2014-8121
DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and previous versions does not properly check if a file is open, which allows remote malicious users to cause a denial of service (infinite loop) by performing a look-up...
Suse Suse Linux Enterprise Server 11.0
Suse Suse Linux Enterprise Desktop 11
Gnu Glibc
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
NA
CVE-2003-0028
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote malicious users to execute arbitrary code via certain integer values i...
Gnu Glibc 2.2.2
Sgi Irix 6.5.9f
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Openafs Openafs 1.1.1a
Gnu Glibc 2.1.2
Sgi Irix 6.5.4m
Sgi Irix 6.5.17f
Sgi Irix 6.5.3f
Gnu Glibc 2.2.5
Openafs Openafs 1.2.1
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Openafs Openafs 1.0
Sgi Irix 6.5.4f
Sgi Irix 6.5.10
Sgi Irix 6.5.17
Sgi Irix 6.5.13m
Openafs Openafs 1.1
Gnu Glibc 2.1.1
Openafs Openafs 1.0.2
Gnu Glibc 2.3.1
NA
CVE-2014-7817
The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent malicious users to execute arbitrary commands, as demonstrated by input containing "$((`...`))".
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 10.04
Debian Debian Linux 7.0
Gnu Glibc 2.21
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
9.1
CVSSv3
CVE-2021-35942
The wordexp function in the GNU C Library (aka glibc) up to and including 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This oc...
Gnu Glibc
Netapp Ontap Select Deploy Administration Utility -
Netapp Solidfire -
Netapp Hci Management Node -
Netapp Active Iq Unified Manager -
Netapp E-series Santricity Os Controller
Debian Debian Linux 10.0
2 Github repositories
9.8
CVSSv3
CVE-2022-23218
The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) up to and including 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of ser...
Gnu Glibc
Oracle Enterprise Operations Monitor 4.3
Oracle Enterprise Operations Monitor 4.4
Oracle Enterprise Operations Monitor 5.0
Oracle Communications Cloud Native Core Unified Data Repository 22.2.0
Debian Debian Linux 10.0
1 Github repository
5.9
CVSSv3
CVE-2019-25013
The iconv feature in the GNU C Library (aka glibc or libc6) up to and including 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.
Gnu Glibc
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Netapp Ontap Select Deploy Administration Utility -
Netapp Service Processor -
Broadcom Fabric Operating System -
Netapp A250 Firmware -
Netapp 500f Firmware -
Debian Debian Linux 10.0
1 Github repository
NA
CVE-2012-3405
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and other versions does not properly calculate a buffer length, which allows context-dependent malicious users to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a de...
Canonical Ubuntu Linux 8.04
Redhat Enterprise Linux 6.0
Gnu Glibc 2.14
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Redhat Enterprise Virtualization 3.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
9.8
CVSSv3
CVE-2019-9169
In the GNU C Library (aka glibc or libc6) up to and including 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.
Gnu Glibc
Netapp Steelstore Cloud Integrated Storage -
Netapp Ontap Select Deploy Administration Utility -
Netapp Cloud Backup
Mcafee Web Gateway
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 16.04
NA
CVE-2012-3404
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.12 and other versions does not properly calculate a buffer length, which allows context-dependent malicious users to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a de...
Canonical Ubuntu Linux 8.04
Redhat Enterprise Linux 6.0
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Redhat Enterprise Virtualization 3.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
Gnu Glibc 2.12
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
buffer overflow
type confusion
server-side request forgery
CVE-2024-38440
CVE-2024-27801
CVE-2024-5868
CVE-2024-0582
CVE-2024-37643
CVE-2024-3105
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
6
7
8
9
10
NEXT »