Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu glibc 2.13 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2012-6656
iconvdata/ibm930.c in GNU C Library (aka glibc) prior to 2.16 allows context-dependent malicious users to cause a denial of service (out-of-bounds read) via a multibyte character value of "0xffff" to the iconv function when converting IBM930 encoded data to UTF-8.
Debian Debian Linux 7.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 10.04
Gnu Glibc
445
VMScore
CVE-2012-3404
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.12 and other versions does not properly calculate a buffer length, which allows context-dependent malicious users to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a de...
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 12.04
Redhat Enterprise Linux 6.0
Redhat Enterprise Virtualization 3.0
Canonical Ubuntu Linux 8.04
Gnu Glibc 2.12
445
VMScore
CVE-2012-3405
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and other versions does not properly calculate a buffer length, which allows context-dependent malicious users to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a de...
Gnu Glibc 2.14
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 12.04
Redhat Enterprise Linux 6.0
Redhat Enterprise Virtualization 3.0
445
VMScore
CVE-2011-4609
The svc_run function in the RPC implementation in glibc prior to 2.15 allows remote malicious users to cause a denial of service (CPU consumption) via a large number of RPC connections.
Gnu Glibc 2.0.3
Gnu Glibc 2.0.2
Gnu Glibc 2.0.1
Gnu Glibc 2.0
Gnu Glibc 2.1.9
Gnu Glibc 2.1.3
Gnu Glibc 2.1.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.1.1
Gnu Glibc 2.13
Gnu Glibc 2.0.6
Gnu Glibc 2.0.4
Gnu Glibc
Gnu Glibc 2.1
Gnu Glibc 2.0.5
445
VMScore
CVE-2011-1659
Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and previous versions allows context-dependent malicious users to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted pattern argumen...
Gnu Glibc 2.2.2
Gnu Glibc 2.9
Gnu Glibc 2.7
Gnu Glibc 2.1.2
Gnu Glibc 2.11
Gnu Glibc 2.0.5
Gnu Glibc 2.2.5
Gnu Glibc 2.0.6
Gnu Glibc 2.10.1
Gnu Glibc 1.00
Gnu Glibc 1.06
Gnu Glibc 2.1.1
Gnu Glibc 1.02
Gnu Glibc 2.0.3
Gnu Glibc 1.07
Gnu Glibc 2.3.1
Gnu Glibc 2.3
Gnu Glibc 2.12.0
Gnu Glibc 2.0
Gnu Glibc
Gnu Glibc 2.1.1.6
Gnu Glibc 1.04
409
VMScore
CVE-2014-7817
The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent malicious users to execute arbitrary commands, as demonstrated by input containing "$((`...`))".
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 10.04
Debian Debian Linux 7.0
Gnu Glibc 2.21
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
329
VMScore
CVE-2011-1658
ld.so in the GNU C Library (aka glibc or libc6) 2.13 and previous versions expands the $ORIGIN dynamic string token when RPATH is composed entirely of this token, which might allow local users to gain privileges by creating a hard link in an arbitrary directory to a (1) setuid or...
Gnu Glibc 1.00
Gnu Glibc 1.08
Gnu Glibc 1.07
Gnu Glibc 2.10.1
Gnu Glibc 2.1
Gnu Glibc 2.0.1
Gnu Glibc 2.0
Gnu Glibc 2.3.1
Gnu Glibc 2.3.10
Gnu Glibc 2.2
Gnu Glibc 2.2.1
Gnu Glibc 2.5
Gnu Glibc 2.5.1
Gnu Glibc
Gnu Glibc 1.04
Gnu Glibc 1.03
Gnu Glibc 2.3.5
Gnu Glibc 2.8
Gnu Glibc 2.0.5
Gnu Glibc 2.0.4
Gnu Glibc 2.2.3
Gnu Glibc 2.2.4
294
VMScore
CVE-2011-1089
The addmntent function in the GNU C Library (aka glibc or libc6) 2.13 and previous versions does not report an error status for failed attempts to write to the /etc/mtab file, which makes it easier for local users to trigger corruption of this file, as demonstrated by writes from...
Gnu Glibc 1.03
Gnu Glibc 1.02
Gnu Glibc 1.09
Gnu Glibc 1.08
Gnu Glibc 2.0.5
Gnu Glibc 2.0.4
Gnu Glibc 2.0.3
Gnu Glibc 2.0.2
Gnu Glibc 2.0.1
Gnu Glibc 2.1.2
Gnu Glibc 2.1.3
Gnu Glibc 2.1.3.10
Gnu Glibc 2.1.9
Gnu Glibc 2.11.3
Gnu Glibc 2.11.2
Gnu Glibc 2.12.2
Gnu Glibc
Gnu Glibc 2.3.5
Gnu Glibc 2.8
Gnu Glibc 2.9
Gnu Glibc 2.10
Gnu Glibc 2.2.4
231
VMScore
CVE-2013-2207
pt_chown in GNU C Library (aka glibc or libc6) prior to 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.
Gnu Glibc 2.14
Gnu Glibc
Gnu Glibc 2.16
Gnu Glibc 2.11.2
Gnu Glibc 2.11.1
Gnu Glibc 2.1.1
Gnu Glibc 2.1
Gnu Glibc 2.0
Gnu Glibc 2.12.2
Gnu Glibc 2.12.1
Gnu Glibc 2.11.3
Gnu Glibc 2.1.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.0.2
Gnu Glibc 2.0.1
Gnu Glibc 2.13
Gnu Glibc 2.1.9
Gnu Glibc 2.1.3
Gnu Glibc 2.0.4
Gnu Glibc 2.0.3
Gnu Glibc 2.15
Gnu Glibc 2.14.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2