Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
glibc vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2016-2148
Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox prior to 1.25.0 allows remote malicious users to have unspecified impact via vectors involving OPTION_6RD parsing.
Busybox Busybox
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
7.5
CVSSv2
CVE-2015-0273
Multiple use-after-free vulnerabilities in ext/date/php_date.c in PHP prior to 5.4.38, 5.5.x prior to 5.5.22, and 5.6.x prior to 5.6.6 allow remote malicious users to execute arbitrary code via crafted serialized input containing a (1) R or (2) r type specifier in (a) DateTimeZon...
Php Php 5.6.1
Php Php 5.5.0
Php Php 5.6.0
Php Php 5.6.5
Php Php 5.5.19
Php Php 5.5.16
Php Php 5.5.1
Php Php 5.5.5
Php Php 5.6.4
Php Php 5.5.21
Php Php 5.5.17
Php Php
Php Php 5.5.14
Php Php 5.5.7
Php Php 5.6.2
Php Php 5.5.12
Php Php 5.5.6
Php Php 5.5.3
Php Php 5.5.8
Php Php 5.5.15
Php Php 5.5.11
Php Php 5.5.13
1 EDB exploit
2 Github repositories
7.5
CVSSv2
CVE-2014-4043
The posix_spawn_file_actions_addopen function in glibc prior to 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent malicious users to trigger use-after-free vulnerabilities.
Gnu Glibc
Opensuse Opensuse 13.1
1 Github repository
7.5
CVSSv2
CVE-2012-4412
Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and previous versions allows context-dependent malicious users to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overf...
Gnu Glibc 2.12.2
Gnu Glibc 2.12.1
Gnu Glibc 2.1.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.0.2
Gnu Glibc 2.0.1
Gnu Glibc 2.15
Gnu Glibc 2.14.1
Gnu Glibc 2.11.1
Gnu Glibc 2.11
Gnu Glibc 2.10.1
Gnu Glibc 2.0.6
Gnu Glibc 2.0.5
Gnu Glibc
Gnu Glibc 2.16
Gnu Glibc 2.11.3
Gnu Glibc 2.11.2
Gnu Glibc 2.1.1
Gnu Glibc 2.1
Gnu Glibc 2.0
Gnu Glibc 2.14
Gnu Glibc 2.13
1 EDB exploit
7.5
CVSSv2
CVE-2010-0015
nis/nss_nis/nis-pwd.c in the GNU C Library (aka glibc or libc6) 2.7 and Embedded GLIBC (EGLIBC) 2.10.2 adds information from the passwd.adjunct.byname map to entries in the passwd map, which allows remote malicious users to obtain the encrypted passwords of NIS accounts by callin...
Gnu Glibc 2.10.2
Gnu Glibc 2.7
7.5
CVSSv2
CVE-2008-1391
Multiple integer overflows in libc in NetBSD 4.x, FreeBSD 6.x and 7.x, and probably other BSD and Apple Mac OS platforms allow context-dependent malicious users to execute arbitrary code via large values of certain integer fields in the format argument to (1) the strfmon function...
Freebsd Freebsd 6.0
Netbsd Netbsd 4.0
Freebsd Freebsd 6.0 P5 Release
Freebsd Freebsd 7.0
Freebsd Freebsd 7.0 Beta4
Freebsd Freebsd 7.0 Releng
1 EDB exploit
7.5
CVSSv2
CVE-2003-0689
The getgrouplist function in GNU libc (glibc) 2.2.4 and previous versions allows malicious users to cause a denial of service (segmentation fault) and execute arbitrary code when a user is a member of a large number of groups, which can cause a buffer overflow.
Redhat Enterprise Linux 2.1
7.5
CVSSv2
CVE-2003-0028
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote malicious users to execute arbitrary code via certain integer values i...
Gnu Glibc 2.1.1
Gnu Glibc 2.1.2
Gnu Glibc 2.3
Gnu Glibc 2.3.1
Mit Kerberos 5 1.2.5
Mit Kerberos 5 1.2.6
Openafs Openafs 1.0.4a
Openafs Openafs 1.1
Openafs Openafs 1.2.3
Openafs Openafs 1.2.4
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.12f
Sgi Irix 6.5.12m
Sgi Irix 6.5.13
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.18
Sgi Irix 6.5.18f
Gnu Glibc 2.1.3
Gnu Glibc 2.2
Gnu Glibc 2.2.1
7.5
CVSSv2
CVE-2002-0029
Buffer overflows in the DNS stub resolver library in ISC BIND 4.9.2 up to and including 4.9.10, and other derived libraries such as BSD libc and GNU glibc, allow remote malicious users to execute arbitrary code via DNS server responses that trigger the overflow in the (1) getnetb...
Isc Bind 4.9.2
Isc Bind 4.9.4
Isc Bind 4.9.10
Isc Bind 4.9.6
Isc Bind 4.9.7
Isc Bind 4.9.8
Isc Bind 4.9.9
Isc Bind 4.9.3
Isc Bind 4.9.5
Astaro Security Linux 2.0.23
Astaro Security Linux 2.0.25
Astaro Security Linux 2.0.26
Astaro Security Linux 2.0.27
Astaro Security Linux 2.0.30
Astaro Security Linux 3.2.0
Astaro Security Linux 3.2.10
Astaro Security Linux 2.0.24
Astaro Security Linux 3.2.11
1 Nmap script
7.5
CVSSv2
CVE-2002-0684
Buffer overflow in DNS resolver functions that perform lookup of network names and addresses, as used in BIND 4.9.8 and ported to glibc 2.2.5 and previous versions, allows remote malicious DNS servers to execute arbitrary code through a subroutine used by functions such as getnet...
Isc Bind 4.9.8
Gnu Glibc
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27977
IMAP
local users
CVE-2024-32038
CVE-2023-49963
CVE-2023-22869
CVE-2024-31497
local
CVE-2024-2961
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »