Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
eglibc vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2011-0536
Multiple untrusted search path vulnerabilities in elf/dl-object.c in certain modified versions of the GNU C Library (aka glibc or libc6), including glibc-2.5-49.el5_5.6 and glibc-2.12-1.7.el6_0.3 in Red Hat Enterprise Linux, allow local users to gain privileges via a crafted dyna...
Gnu Glibc 2.5-49.el5 5.6
Gnu Glibc 2.12-1.7.el6 0.3
Redhat Enterprise Linux
1 EDB exploit
NA
CVE-2011-1089
The addmntent function in the GNU C Library (aka glibc or libc6) 2.13 and previous versions does not report an error status for failed attempts to write to the /etc/mtab file, which makes it easier for local users to trigger corruption of this file, as demonstrated by writes from...
Gnu Glibc 1.03
Gnu Glibc 1.02
Gnu Glibc 1.09
Gnu Glibc 1.08
Gnu Glibc 2.0.5
Gnu Glibc 2.0.4
Gnu Glibc 2.0.3
Gnu Glibc 2.0.2
Gnu Glibc 2.0.1
Gnu Glibc 2.1.2
Gnu Glibc 2.1.3
Gnu Glibc 2.1.3.10
Gnu Glibc 2.1.9
Gnu Glibc 2.11.3
Gnu Glibc 2.11.2
Gnu Glibc 2.12.2
Gnu Glibc
Gnu Glibc 2.3.5
Gnu Glibc 2.8
Gnu Glibc 2.9
Gnu Glibc 2.10
Gnu Glibc 2.2.4
NA
CVE-2011-4609
The svc_run function in the RPC implementation in glibc prior to 2.15 allows remote malicious users to cause a denial of service (CPU consumption) via a large number of RPC connections.
Gnu Glibc 2.0.3
Gnu Glibc 2.0.2
Gnu Glibc 2.0.1
Gnu Glibc 2.0
Gnu Glibc 2.1.9
Gnu Glibc 2.1.3
Gnu Glibc 2.1.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.1.1
Gnu Glibc 2.13
Gnu Glibc 2.0.6
Gnu Glibc 2.0.4
Gnu Glibc
Gnu Glibc 2.1
Gnu Glibc 2.0.5
NA
CVE-2012-3406
The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not "properly restrict the use of" the alloca function when allocating the SPECS array, which allows context-dependent malicious users to bypass the...
Redhat Enterprise Linux 5
Redhat Enterprise Linux 6.0
Redhat Enterprise Virtualization 3.0
Gnu Glibc 2.5
Gnu Glibc 2.12
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 12.04
9.1
CVSSv3
CVE-2015-8776
The strftime function in the GNU C Library (aka glibc or libc6) prior to 2.23 allows context-dependent malicious users to cause a denial of service (application crash) or possibly obtain sensitive information via an out-of-range time value.
Suse Linux Enterprise Software Development Kit 11
Suse Linux Enterprise Desktop 12
Suse Linux Enterprise Debuginfo 11
Suse Linux Enterprise Server 11
Suse Linux Enterprise Software Development Kit 12
Suse Suse Linux Enterprise Server 12
Opensuse Opensuse 13.2
Suse Linux Enterprise Desktop 11
Suse Linux Enterprise Server 12
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.10
Debian Debian Linux 8.0
Fedoraproject Fedora 23
Gnu Glibc
NA
CVE-2012-0864
Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent malicious users to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arg...
Gnu Glibc 2.14
NA
CVE-2010-3847
elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) up to and including 2.11.2, and 2.12.x up to and including 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic...
Gnu Glibc 2.2.2
Gnu Glibc 2.9
Gnu Glibc 2.7
Gnu Glibc 2.1.2
Gnu Glibc 2.11
Gnu Glibc 2.0.5
Gnu Glibc 2.2.5
Gnu Glibc 2.0.6
Gnu Glibc 2.10.1
Gnu Glibc 1.00
Gnu Glibc 1.06
Gnu Glibc 2.1.1
Gnu Glibc 1.02
Gnu Glibc 2.0.3
Gnu Glibc 1.07
Gnu Glibc 2.3.1
Gnu Glibc 2.3
Gnu Glibc 2.12.0
Gnu Glibc 2.0
Gnu Glibc 2.1.1.6
Gnu Glibc 1.04
Gnu Glibc 1.01
4 EDB exploits
1 Github repository
NA
CVE-2015-5277
The get_contents function in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) prior to 2.20 might allow local users to cause a denial of service (heap corruption) or gain privileges via a long line in the NSS files database.
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Hpc Node 7.0
Gnu Glibc
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
7.8
CVSSv3
CVE-2017-1000408
A memory leak in glibc 2.1.1 (released on May 24, 1999) can be reached and amplified through the LD_HWCAP_MASK environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.
Gnu Glibc 2.1.1
1 EDB exploit
7
CVSSv3
CVE-2017-1000409
A buffer overflow in glibc 2.5 (released on September 29, 2006) and can be triggered through the LD_LIBRARY_PATH environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.
Gnu Glibc 2.5
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »