Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu glibc vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2009-5029
Integer overflow in the __tzfile_read function in glibc prior to 2.15 allows context-dependent malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.
Gnu Glibc 2.1.2
Gnu Glibc 2.0.5
Gnu Glibc 2.0.6
Gnu Glibc 2.1.1
Gnu Glibc 2.0.3
Gnu Glibc 2.0
Gnu Glibc 2.13
Gnu Glibc 2.1.1.6
Gnu Glibc 2.1
Gnu Glibc 2.1.9
Gnu Glibc 2.0.1
Gnu Glibc 2.0.4
Gnu Glibc 2.0.2
Gnu Glibc 2.1.3
Gnu Glibc
1 EDB exploit
NA
CVE-2011-4609
The svc_run function in the RPC implementation in glibc prior to 2.15 allows remote malicious users to cause a denial of service (CPU consumption) via a large number of RPC connections.
Gnu Glibc 2.0.3
Gnu Glibc 2.0.2
Gnu Glibc 2.0.1
Gnu Glibc 2.0
Gnu Glibc 2.1.9
Gnu Glibc 2.1.3
Gnu Glibc 2.1.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.1.1
Gnu Glibc 2.13
Gnu Glibc 2.0.6
Gnu Glibc 2.0.4
Gnu Glibc
Gnu Glibc 2.1
Gnu Glibc 2.0.5
NA
CVE-2004-0968
The catchsegv script in glibc 2.3.2 and previous versions allows local users to overwrite files via a symlink attack on temporary files.
Gnu Glibc 2.0.5
Gnu Glibc 2.0.6
Gnu Glibc 2.1.9
Gnu Glibc 2.2
Gnu Glibc 2.3.1
Gnu Glibc 2.3.10
Gnu Glibc 2.1
Gnu Glibc 2.1.1
Gnu Glibc 2.2.1
Gnu Glibc 2.2.2
Gnu Glibc 2.3.2
Gnu Glibc 2.3.3
Gnu Glibc 2.0
Gnu Glibc 2.0.1
Gnu Glibc 2.0.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.1.2
Gnu Glibc 2.2.3
Gnu Glibc 2.2.4
Gnu Glibc 2.3.4
Gnu Glibc 2.0.3
Gnu Glibc 2.0.4
NA
CVE-2011-2702
Integer signedness error in Glibc prior to 2.13 and eglibc prior to 2.13, when using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows context-dependent malicious users to execute arbitrary code via a negative length parameter to (1) memcpy-ssse3-rep.S, (2) me...
Gnu Glibc 2.12.1
Gnu Glibc
Gnu Glibc 2.12
Gnu Eglibc
1 EDB exploit
NA
CVE-2000-0335
The resolver in glibc 2.1.3 uses predictable IDs, which allows a local malicious user to spoof DNS query results.
Gnu Glibc 2.1
Gnu Glibc 2.1.2
Gnu Glibc 2.1.3
Isc Bind 8.2
Isc Bind 8.2.1
Gnu Glibc 2.0
Gnu Glibc 2.1.1
Isc Bind 8.2.2
NA
CVE-2010-0015
nis/nss_nis/nis-pwd.c in the GNU C Library (aka glibc or libc6) 2.7 and Embedded GLIBC (EGLIBC) 2.10.2 adds information from the passwd.adjunct.byname map to entries in the passwd map, which allows remote malicious users to obtain the encrypted passwords of NIS accounts by callin...
Gnu Glibc 2.10.2
Gnu Glibc 2.7
NA
CVE-2002-1265
The Sun RPC functionality in multiple libc implementations does not provide a time-out mechanism when reading data from TCP connections, which allows remote malicious users to cause a denial of service (hang).
Gnu Glibc 2.0.6
Gnu Glibc 2.1
Gnu Glibc 2.2.1
Gnu Glibc 2.2.2
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Gnu Glibc 2.0.4
Gnu Glibc 2.0.5
Gnu Glibc 2.1.3.10
Gnu Glibc 2.2
Sgi Irix 2.3.1
Sgi Irix 6.5
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Gnu Glibc 2.0.1
Gnu Glibc 2.0.2
NA
CVE-2011-0536
Multiple untrusted search path vulnerabilities in elf/dl-object.c in certain modified versions of the GNU C Library (aka glibc or libc6), including glibc-2.5-49.el5_5.6 and glibc-2.12-1.7.el6_0.3 in Red Hat Enterprise Linux, allow local users to gain privileges via a crafted dyna...
Gnu Glibc 2.5-49.el5 5.6
Gnu Glibc 2.12-1.7.el6 0.3
Redhat Enterprise Linux
1 EDB exploit
5.5
CVSSv3
CVE-2019-7309
In the GNU C Library (aka glibc or libc6) up to and including 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.
Gnu Glibc
9.8
CVSSv3
CVE-2019-1010022
GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comment...
Gnu Glibc -
1 Github repository
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »