Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
glibc vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2011-4609
The svc_run function in the RPC implementation in glibc prior to 2.15 allows remote malicious users to cause a denial of service (CPU consumption) via a large number of RPC connections.
Gnu Glibc 2.0.3
Gnu Glibc 2.0.2
Gnu Glibc 2.0.1
Gnu Glibc 2.0
Gnu Glibc 2.1.9
Gnu Glibc 2.1.3
Gnu Glibc 2.1.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.1.1
Gnu Glibc 2.13
Gnu Glibc 2.0.6
Gnu Glibc 2.0.4
Gnu Glibc
Gnu Glibc 2.1
Gnu Glibc 2.0.5
NA
CVE-2009-5029
Integer overflow in the __tzfile_read function in glibc prior to 2.15 allows context-dependent malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.
Gnu Glibc 2.1.2
Gnu Glibc 2.0.5
Gnu Glibc 2.0.6
Gnu Glibc 2.1.1
Gnu Glibc 2.0.3
Gnu Glibc 2.0
Gnu Glibc 2.13
Gnu Glibc 2.1.1.6
Gnu Glibc 2.1
Gnu Glibc 2.1.9
Gnu Glibc 2.0.1
Gnu Glibc 2.0.4
Gnu Glibc 2.0.2
Gnu Glibc 2.1.3
Gnu Glibc
1 EDB exploit
NA
CVE-2004-0968
The catchsegv script in glibc 2.3.2 and previous versions allows local users to overwrite files via a symlink attack on temporary files.
Gnu Glibc 2.0.5
Gnu Glibc 2.0.6
Gnu Glibc 2.1.9
Gnu Glibc 2.2
Gnu Glibc 2.3.1
Gnu Glibc 2.3.10
Gnu Glibc 2.1
Gnu Glibc 2.1.1
Gnu Glibc 2.2.1
Gnu Glibc 2.2.2
Gnu Glibc 2.3.2
Gnu Glibc 2.3.3
Gnu Glibc 2.0
Gnu Glibc 2.0.1
Gnu Glibc 2.0.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.1.2
Gnu Glibc 2.2.3
Gnu Glibc 2.2.4
Gnu Glibc 2.3.4
Gnu Glibc 2.0.3
Gnu Glibc 2.0.4
NA
CVE-2011-2702
Integer signedness error in Glibc prior to 2.13 and eglibc prior to 2.13, when using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows context-dependent malicious users to execute arbitrary code via a negative length parameter to (1) memcpy-ssse3-rep.S, (2) me...
Gnu Glibc 2.12.1
Gnu Glibc
Gnu Glibc 2.12
Gnu Eglibc
1 EDB exploit
NA
CVE-2000-0335
The resolver in glibc 2.1.3 uses predictable IDs, which allows a local malicious user to spoof DNS query results.
Gnu Glibc 2.1
Gnu Glibc 2.1.2
Gnu Glibc 2.1.3
Isc Bind 8.2
Isc Bind 8.2.1
Gnu Glibc 2.0
Gnu Glibc 2.1.1
Isc Bind 8.2.2
NA
CVE-2010-0015
nis/nss_nis/nis-pwd.c in the GNU C Library (aka glibc or libc6) 2.7 and Embedded GLIBC (EGLIBC) 2.10.2 adds information from the passwd.adjunct.byname map to entries in the passwd map, which allows remote malicious users to obtain the encrypted passwords of NIS accounts by callin...
Gnu Glibc 2.10.2
Gnu Glibc 2.7
NA
CVE-2002-1265
The Sun RPC functionality in multiple libc implementations does not provide a time-out mechanism when reading data from TCP connections, which allows remote malicious users to cause a denial of service (hang).
Gnu Glibc 2.0.6
Gnu Glibc 2.1
Gnu Glibc 2.2.1
Gnu Glibc 2.2.2
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Gnu Glibc 2.0.4
Gnu Glibc 2.0.5
Gnu Glibc 2.1.3.10
Gnu Glibc 2.2
Sgi Irix 2.3.1
Sgi Irix 6.5
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Gnu Glibc 2.0.1
Gnu Glibc 2.0.2
NA
CVE-2011-0536
Multiple untrusted search path vulnerabilities in elf/dl-object.c in certain modified versions of the GNU C Library (aka glibc or libc6), including glibc-2.5-49.el5_5.6 and glibc-2.12-1.7.el6_0.3 in Red Hat Enterprise Linux, allow local users to gain privileges via a crafted dyna...
Gnu Glibc 2.5-49.el5 5.6
Gnu Glibc 2.12-1.7.el6 0.3
Redhat Enterprise Linux
1 EDB exploit
5.9
CVSSv3
CVE-2016-10228
The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and previous versions, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, lead...
Gnu Glibc
9.8
CVSSv3
CVE-2005-3590
The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing malicious users to corrupt memory.
Gnu Glibc
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
CVE-2006-4304
CVE-2023-26603
CVE-2024-28327
CVE-2023-50363
CVE-2024-21905
template injection
CVE-2024-3400
cross-site request forgery
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »