Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu glibc 2.1.9 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2011-4609
The svc_run function in the RPC implementation in glibc prior to 2.15 allows remote malicious users to cause a denial of service (CPU consumption) via a large number of RPC connections.
Gnu Glibc 2.0.3
Gnu Glibc 2.0.2
Gnu Glibc 2.0.1
Gnu Glibc 2.0
Gnu Glibc 2.1.9
Gnu Glibc 2.1.3
Gnu Glibc 2.1.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.1.1
Gnu Glibc 2.13
Gnu Glibc 2.0.6
Gnu Glibc 2.0.4
Gnu Glibc
Gnu Glibc 2.1
Gnu Glibc 2.0.5
5
CVSSv2
CVE-2011-1659
Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and previous versions allows context-dependent malicious users to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted pattern argumen...
Gnu Glibc 2.2.2
Gnu Glibc 2.9
Gnu Glibc 2.7
Gnu Glibc 2.1.2
Gnu Glibc 2.11
Gnu Glibc 2.0.5
Gnu Glibc 2.2.5
Gnu Glibc 2.0.6
Gnu Glibc 2.10.1
Gnu Glibc 1.00
Gnu Glibc 1.06
Gnu Glibc 2.1.1
Gnu Glibc 1.02
Gnu Glibc 2.0.3
Gnu Glibc 1.07
Gnu Glibc 2.3.1
Gnu Glibc 2.3
Gnu Glibc 2.12.0
Gnu Glibc 2.0
Gnu Glibc
Gnu Glibc 2.1.1.6
Gnu Glibc 1.04
5
CVSSv2
CVE-2010-4051
The regcomp implementation in the GNU C Library (aka glibc or libc6) up to and including 2.11.3, and 2.12.x up to and including 2.12.2, allows context-dependent malicious users to cause a denial of service (application crash) via a regular expression containing adjacent bounded r...
Gnu Glibc 2.1.2
Gnu Glibc 2.11
Gnu Glibc 2.10.1
Gnu Glibc 1.00
Gnu Glibc 1.06
Gnu Glibc 2.1.1
Gnu Glibc 1.02
Gnu Glibc 1.07
Gnu Glibc 2.12.0
Gnu Glibc 2.1.1.6
Gnu Glibc 1.04
Gnu Glibc 1.01
Gnu Glibc 2.1
Gnu Glibc 1.09.1
Gnu Glibc 2.1.9
Gnu Glibc 2.12.1
Gnu Glibc 1.09
Gnu Glibc 2.10
Gnu Glibc 2.11.2
Gnu Glibc 1.03
Gnu Glibc 2.1.3.10
Gnu Glibc 2.11.3
1 EDB exploit
5
CVSSv2
CVE-2010-4052
Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or libc6) up to and including 2.11.3, and 2.12.x up to and including 2.12.2, allows context-dependent malicious users to cause a denial of service (resource exhaustion) via a regular exp...
Gnu Glibc 1.00
Gnu Glibc 1.01
Gnu Glibc 1.07
Gnu Glibc 1.06
Gnu Glibc 2.1.3.10
Gnu Glibc 2.1.9
Gnu Glibc 2.11.3
Gnu Glibc 2.12.2
Gnu Glibc 1.09.1
Gnu Glibc 1.09
Gnu Glibc 1.08
Gnu Glibc 2.1.2
Gnu Glibc 2.1.3
Gnu Glibc 2.10
Gnu Glibc 2.10.1
Gnu Glibc 1.05
Gnu Glibc 1.04
Gnu Glibc 2.1
Gnu Glibc 2.10.2
Gnu Glibc 2.12.0
Gnu Glibc 2.12.1
Gnu Glibc 2.11
2 EDB exploits
5
CVSSv2
CVE-2009-4880
Multiple integer overflows in the strfmon implementation in the GNU C Library (aka glibc or libc6) 2.10.1 and previous versions allow context-dependent malicious users to cause a denial of service (memory consumption or application crash) via a crafted format string, as demonstra...
Gnu Glibc 2.2.2
Gnu Glibc 2.9
Gnu Glibc 2.7
Gnu Glibc 2.1.2
Gnu Glibc 2.0.5
Gnu Glibc
Gnu Glibc 2.2.5
Gnu Glibc 2.0.6
Gnu Glibc 2.1.1
Gnu Glibc 2.0.3
Gnu Glibc 2.3.1
Gnu Glibc 2.3
Gnu Glibc 2.0
Gnu Glibc 2.1.1.6
Gnu Glibc 2.3.10
Gnu Glibc 2.4
Gnu Glibc 2.1
Gnu Glibc 2.3.4
Gnu Glibc 2.1.9
Gnu Glibc 2.3.3
Gnu Glibc 2.6.1
Gnu Glibc 2.0.1
1 EDB exploit
5
CVSSv2
CVE-2009-4881
Integer overflow in the __vstrfmon_l function in stdlib/strfmon_l.c in the strfmon implementation in the GNU C Library (aka glibc or libc6) prior to 2.10.1 allows context-dependent malicious users to cause a denial of service (application crash) via a crafted format string, as de...
Gnu Glibc 2.2.2
Gnu Glibc 2.7
Gnu Glibc 2.1.2
Gnu Glibc 2.0.5
Gnu Glibc 2.2.5
Gnu Glibc 2.0.6
Gnu Glibc 1.00
Gnu Glibc 1.06
Gnu Glibc 2.1.1
Gnu Glibc 1.02
Gnu Glibc 2.0.3
Gnu Glibc 1.07
Gnu Glibc 2.3.1
Gnu Glibc 2.3
Gnu Glibc 2.0
Gnu Glibc 2.1.1.6
Gnu Glibc 1.04
Gnu Glibc 1.01
Gnu Glibc 2.3.10
Gnu Glibc 2.4
Gnu Glibc 2.1
Gnu Glibc 2.3.4
3.7
CVSSv2
CVE-2011-1658
ld.so in the GNU C Library (aka glibc or libc6) 2.13 and previous versions expands the $ORIGIN dynamic string token when RPATH is composed entirely of this token, which might allow local users to gain privileges by creating a hard link in an arbitrary directory to a (1) setuid or...
Gnu Glibc 1.00
Gnu Glibc 1.08
Gnu Glibc 1.07
Gnu Glibc 2.10.1
Gnu Glibc 2.1
Gnu Glibc 2.0.1
Gnu Glibc 2.0
Gnu Glibc 2.3.1
Gnu Glibc 2.3.10
Gnu Glibc 2.2
Gnu Glibc 2.2.1
Gnu Glibc 2.5
Gnu Glibc 2.5.1
Gnu Glibc
Gnu Glibc 1.04
Gnu Glibc 1.03
Gnu Glibc 2.3.5
Gnu Glibc 2.8
Gnu Glibc 2.0.5
Gnu Glibc 2.0.4
Gnu Glibc 2.2.3
Gnu Glibc 2.2.4
3.3
CVSSv2
CVE-2011-1089
The addmntent function in the GNU C Library (aka glibc or libc6) 2.13 and previous versions does not report an error status for failed attempts to write to the /etc/mtab file, which makes it easier for local users to trigger corruption of this file, as demonstrated by writes from...
Gnu Glibc 1.03
Gnu Glibc 1.02
Gnu Glibc 1.09
Gnu Glibc 1.08
Gnu Glibc 2.0.5
Gnu Glibc 2.0.4
Gnu Glibc 2.0.3
Gnu Glibc 2.0.2
Gnu Glibc 2.0.1
Gnu Glibc 2.1.2
Gnu Glibc 2.1.3
Gnu Glibc 2.1.3.10
Gnu Glibc 2.1.9
Gnu Glibc 2.11.3
Gnu Glibc 2.11.2
Gnu Glibc 2.12.2
Gnu Glibc
Gnu Glibc 2.3.5
Gnu Glibc 2.8
Gnu Glibc 2.9
Gnu Glibc 2.10
Gnu Glibc 2.2.4
2.6
CVSSv2
CVE-2013-2207
pt_chown in GNU C Library (aka glibc or libc6) prior to 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.
Gnu Glibc 2.14
Gnu Glibc
Gnu Glibc 2.16
Gnu Glibc 2.11.2
Gnu Glibc 2.11.1
Gnu Glibc 2.1.1
Gnu Glibc 2.1
Gnu Glibc 2.0
Gnu Glibc 2.12.2
Gnu Glibc 2.12.1
Gnu Glibc 2.11.3
Gnu Glibc 2.1.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.0.2
Gnu Glibc 2.0.1
Gnu Glibc 2.13
Gnu Glibc 2.1.9
Gnu Glibc 2.1.3
Gnu Glibc 2.0.4
Gnu Glibc 2.0.3
Gnu Glibc 2.15
Gnu Glibc 2.14.1
2.1
CVSSv2
CVE-2004-0968
The catchsegv script in glibc 2.3.2 and previous versions allows local users to overwrite files via a symlink attack on temporary files.
Gnu Glibc 2.0.5
Gnu Glibc 2.0.6
Gnu Glibc 2.1.9
Gnu Glibc 2.2
Gnu Glibc 2.3.1
Gnu Glibc 2.3.10
Gnu Glibc 2.1
Gnu Glibc 2.1.1
Gnu Glibc 2.2.1
Gnu Glibc 2.2.2
Gnu Glibc 2.3.2
Gnu Glibc 2.3.3
Gnu Glibc 2.0
Gnu Glibc 2.0.1
Gnu Glibc 2.0.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.1.2
Gnu Glibc 2.2.3
Gnu Glibc 2.2.4
Gnu Glibc 2.3.4
Gnu Glibc 2.0.3
Gnu Glibc 2.0.4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »