Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu glibc - vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2009-5029
Integer overflow in the __tzfile_read function in glibc prior to 2.15 allows context-dependent malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.
Gnu Glibc 2.1.2
Gnu Glibc 2.0.5
Gnu Glibc 2.0.6
Gnu Glibc 2.1.1
Gnu Glibc 2.0.3
Gnu Glibc 2.0
Gnu Glibc 2.13
Gnu Glibc 2.1.1.6
Gnu Glibc 2.1
Gnu Glibc 2.1.9
Gnu Glibc 2.0.1
Gnu Glibc 2.0.4
Gnu Glibc 2.0.2
Gnu Glibc 2.1.3
Gnu Glibc
1 EDB exploit
5
CVSSv2
CVE-2011-4609
The svc_run function in the RPC implementation in glibc prior to 2.15 allows remote malicious users to cause a denial of service (CPU consumption) via a large number of RPC connections.
Gnu Glibc 2.0.3
Gnu Glibc 2.0.2
Gnu Glibc 2.0.1
Gnu Glibc 2.0
Gnu Glibc 2.1.9
Gnu Glibc 2.1.3
Gnu Glibc 2.1.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.1.1
Gnu Glibc 2.13
Gnu Glibc 2.0.6
Gnu Glibc 2.0.4
Gnu Glibc
Gnu Glibc 2.1
Gnu Glibc 2.0.5
2.1
CVSSv2
CVE-2004-0968
The catchsegv script in glibc 2.3.2 and previous versions allows local users to overwrite files via a symlink attack on temporary files.
Gnu Glibc 2.0.5
Gnu Glibc 2.0.6
Gnu Glibc 2.1.9
Gnu Glibc 2.2
Gnu Glibc 2.3.1
Gnu Glibc 2.3.10
Gnu Glibc 2.1
Gnu Glibc 2.1.1
Gnu Glibc 2.2.1
Gnu Glibc 2.2.2
Gnu Glibc 2.3.2
Gnu Glibc 2.3.3
Gnu Glibc 2.0
Gnu Glibc 2.0.1
Gnu Glibc 2.0.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.1.2
Gnu Glibc 2.2.3
Gnu Glibc 2.2.4
Gnu Glibc 2.3.4
Gnu Glibc 2.0.3
Gnu Glibc 2.0.4
6.8
CVSSv2
CVE-2011-2702
Integer signedness error in Glibc prior to 2.13 and eglibc prior to 2.13, when using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows context-dependent malicious users to execute arbitrary code via a negative length parameter to (1) memcpy-ssse3-rep.S, (2) me...
Gnu Glibc 2.12.1
Gnu Glibc
Gnu Glibc 2.12
Gnu Eglibc
1 EDB exploit
7.5
CVSSv2
CVE-2000-0335
The resolver in glibc 2.1.3 uses predictable IDs, which allows a local malicious user to spoof DNS query results.
Gnu Glibc 2.1
Gnu Glibc 2.1.2
Gnu Glibc 2.1.3
Isc Bind 8.2
Isc Bind 8.2.1
Gnu Glibc 2.0
Gnu Glibc 2.1.1
Isc Bind 8.2.2
7.5
CVSSv2
CVE-2010-0015
nis/nss_nis/nis-pwd.c in the GNU C Library (aka glibc or libc6) 2.7 and Embedded GLIBC (EGLIBC) 2.10.2 adds information from the passwd.adjunct.byname map to entries in the passwd map, which allows remote malicious users to obtain the encrypted passwords of NIS accounts by callin...
Gnu Glibc 2.10.2
Gnu Glibc 2.7
5
CVSSv2
CVE-2002-1265
The Sun RPC functionality in multiple libc implementations does not provide a time-out mechanism when reading data from TCP connections, which allows remote malicious users to cause a denial of service (hang).
Gnu Glibc 2.0.6
Gnu Glibc 2.1
Gnu Glibc 2.2.1
Gnu Glibc 2.2.2
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Gnu Glibc 2.0.4
Gnu Glibc 2.0.5
Gnu Glibc 2.1.3.10
Gnu Glibc 2.2
Sgi Irix 2.3.1
Sgi Irix 6.5
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Gnu Glibc 2.0.1
Gnu Glibc 2.0.2
6.9
CVSSv2
CVE-2011-0536
Multiple untrusted search path vulnerabilities in elf/dl-object.c in certain modified versions of the GNU C Library (aka glibc or libc6), including glibc-2.5-49.el5_5.6 and glibc-2.12-1.7.el6_0.3 in Red Hat Enterprise Linux, allow local users to gain privileges via a crafted dyna...
Gnu Glibc 2.5-49.el5 5.6
Gnu Glibc 2.12-1.7.el6 0.3
Redhat Enterprise Linux
1 EDB exploit
7.5
CVSSv2
CVE-2014-9984
nscd in the GNU C Library (aka glibc or libc6) before version 2.20 does not correctly compute the size of an internal buffer when processing netgroup requests, possibly leading to an nscd daemon crash or code execution as the user running nscd.
Gnu Glibc
4
CVSSv2
CVE-2023-0687
A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix thi...
Gnu Glibc
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »