Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu glibc vulnerabilities and exploits
(subscribe to this query)
575
VMScore
CVE-2008-1447
The DNS protocol, as implemented in (1) BIND 8 and 9 prior to 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote malicious users to spoof DNS traffic via a birthday attack th...
Isc Bind 4
Isc Bind 8
Isc Bind 9.2.9
3 EDB exploits
4 Nmap scripts
1 Github repository
571
VMScore
CVE-2021-35942
The wordexp function in the GNU C Library (aka glibc) up to and including 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This oc...
Gnu Glibc
Netapp Ontap Select Deploy Administration Utility -
Netapp Solidfire -
Netapp Hci Management Node -
Netapp Active Iq Unified Manager -
Netapp E-series Santricity Os Controller
Debian Debian Linux 10.0
2 Github repositories
570
VMScore
CVE-2015-8776
The strftime function in the GNU C Library (aka glibc or libc6) prior to 2.23 allows context-dependent malicious users to cause a denial of service (application crash) or possibly obtain sensitive information via an out-of-range time value.
Suse Linux Enterprise Software Development Kit 11
Suse Linux Enterprise Desktop 12
Suse Linux Enterprise Debuginfo 11
Suse Linux Enterprise Server 11
Suse Linux Enterprise Software Development Kit 12
Suse Suse Linux Enterprise Server 12
Opensuse Opensuse 13.2
Suse Linux Enterprise Desktop 11
Suse Linux Enterprise Server 12
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.10
Debian Debian Linux 8.0
Fedoraproject Fedora 23
Gnu Glibc
552
VMScore
CVE-2011-1095
locale/programs/locale.c in locale in the GNU C Library (aka glibc or libc6) prior to 2.13 does not quote its output, which might allow local users to gain privileges via a crafted localization environment variable, in conjunction with a program that executes a script that uses t...
Gnu Glibc 2.2.2
Gnu Glibc 2.9
Gnu Glibc 2.7
Gnu Glibc 2.1.2
Gnu Glibc 2.11
Gnu Glibc 2.0.5
Gnu Glibc 2.2.5
Gnu Glibc 2.0.6
Gnu Glibc 2.10.1
Gnu Glibc 1.00
Gnu Glibc 1.06
Gnu Glibc 2.1.1
Gnu Glibc 1.02
Gnu Glibc 2.0.3
Gnu Glibc 1.07
Gnu Glibc 2.3.1
Gnu Glibc 2.3
Gnu Glibc 2.12.0
Gnu Glibc 2.0
Gnu Glibc 2.1.1.6
Gnu Glibc 1.04
Gnu Glibc 1.01
526
VMScore
CVE-2020-1751
An out-of-bounds write vulnerability was found in glibc prior to 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code execu...
Gnu Glibc
Redhat Enterprise Linux 8.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 16.04
515
VMScore
CVE-2013-4788
The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and previous versions, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent malicious users to control execution flow ...
Gnu Glibc
Gnu Glibc 2.11.3
Gnu Glibc 2.11.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.1.1
Gnu Glibc 2.0.1
Gnu Glibc 2.0
Gnu Glibc 2.14.1
Gnu Glibc 2.14
Gnu Glibc 2.10.1
Gnu Glibc 2.1.9
Gnu Glibc 2.0.5
Gnu Glibc 2.0.4
Gnu Glibc 2.13
Gnu Glibc 2.12.2
Gnu Glibc 2.12.1
Gnu Glibc 2.1.3
Gnu Glibc 2.1.2
Gnu Glibc 2.0.3
Gnu Glibc 2.0.2
Gnu Glibc 2.16
Gnu Glibc 2.15
1 EDB exploit
515
VMScore
CVE-2011-1071
The GNU C Library (aka glibc or libc6) prior to 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent malicious users to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka a "stack extensi...
Gnu Glibc 2.2.2
Gnu Glibc 2.9
Gnu Glibc 2.7
Gnu Glibc 2.1.2
Gnu Glibc 2.11
Gnu Glibc 2.0.5
Gnu Glibc 2.2.5
Gnu Glibc 2.0.6
Gnu Glibc 2.10.1
Gnu Glibc 1.00
Gnu Glibc 1.06
Gnu Glibc 2.1.1
Gnu Glibc 1.02
Gnu Glibc 2.0.3
Gnu Glibc 1.07
Gnu Glibc 2.3.1
Gnu Glibc 2.3
Gnu Glibc 2.12.0
Gnu Glibc 2.0
Gnu Glibc 2.1.1.6
Gnu Glibc 1.04
Gnu Glibc 1.01
1 EDB exploit
510
VMScore
CVE-2010-4052
Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or libc6) up to and including 2.11.3, and 2.12.x up to and including 2.12.2, allows context-dependent malicious users to cause a denial of service (resource exhaustion) via a regular exp...
Gnu Glibc 1.00
Gnu Glibc 1.01
Gnu Glibc 1.07
Gnu Glibc 1.06
Gnu Glibc 2.1.3.10
Gnu Glibc 2.1.9
Gnu Glibc 2.11.3
Gnu Glibc 2.12.2
Gnu Glibc 1.09.1
Gnu Glibc 1.09
Gnu Glibc 1.08
Gnu Glibc 2.1.2
Gnu Glibc 2.1.3
Gnu Glibc 2.10
Gnu Glibc 2.10.1
Gnu Glibc 1.05
Gnu Glibc 1.04
Gnu Glibc 2.1
Gnu Glibc 2.10.2
Gnu Glibc 2.12.0
Gnu Glibc 2.12.1
Gnu Glibc 2.11
2 EDB exploits
505
VMScore
CVE-2010-4051
The regcomp implementation in the GNU C Library (aka glibc or libc6) up to and including 2.11.3, and 2.12.x up to and including 2.12.2, allows context-dependent malicious users to cause a denial of service (application crash) via a regular expression containing adjacent bounded r...
Gnu Glibc 2.1.2
Gnu Glibc 2.11
Gnu Glibc 2.10.1
Gnu Glibc 1.00
Gnu Glibc 1.06
Gnu Glibc 2.1.1
Gnu Glibc 1.02
Gnu Glibc 1.07
Gnu Glibc 2.12.0
Gnu Glibc 2.1.1.6
Gnu Glibc 1.04
Gnu Glibc 1.01
Gnu Glibc 2.1
Gnu Glibc 1.09.1
Gnu Glibc 2.1.9
Gnu Glibc 2.12.1
Gnu Glibc 1.09
Gnu Glibc 2.10
Gnu Glibc 2.11.2
Gnu Glibc 1.03
Gnu Glibc 2.1.3.10
Gnu Glibc 2.11.3
1 EDB exploit
505
VMScore
CVE-2009-4880
Multiple integer overflows in the strfmon implementation in the GNU C Library (aka glibc or libc6) 2.10.1 and previous versions allow context-dependent malicious users to cause a denial of service (memory consumption or application crash) via a crafted format string, as demonstra...
Gnu Glibc 2.2.2
Gnu Glibc 2.9
Gnu Glibc 2.7
Gnu Glibc 2.1.2
Gnu Glibc 2.0.5
Gnu Glibc
Gnu Glibc 2.2.5
Gnu Glibc 2.0.6
Gnu Glibc 2.1.1
Gnu Glibc 2.0.3
Gnu Glibc 2.3.1
Gnu Glibc 2.3
Gnu Glibc 2.0
Gnu Glibc 2.1.1.6
Gnu Glibc 2.3.10
Gnu Glibc 2.4
Gnu Glibc 2.1
Gnu Glibc 2.3.4
Gnu Glibc 2.1.9
Gnu Glibc 2.3.3
Gnu Glibc 2.6.1
Gnu Glibc 2.0.1
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-17519
open redirect
CVE-2024-21683
cache poisoning
CVE-2021-47524
CVE-2021-47521
CVE-2024-5229
CVE-2021-47560
local
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »