Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu glibc 2.15 vulnerabilities and exploits
(subscribe to this query)
8.4
CVSSv3
CVE-2016-2856
pt_chown in the glibc package prior to 2.19-18+deb8u4 on Debian jessie; the elibc package prior to 2.15-0ubuntu10.14 on Ubuntu 12.04 LTS and prior to 2.19-0ubuntu6.8 on Ubuntu 14.04 LTS; and the glibc package prior to 2.21-0ubuntu4.2 on Ubuntu 15.10 and prior to 2.23-0ubuntu1 on ...
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 12.04
Debian Debian Linux 8.0
1 EDB exploit
6.2
CVSSv3
CVE-2011-5320
scanf and related functions in glibc prior to 2.15 allow local users to cause a denial of service (segmentation fault) via a large string of 0s.
Gnu Glibc
NA
CVE-2012-4412
Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and previous versions allows context-dependent malicious users to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overf...
Gnu Glibc 2.12.2
Gnu Glibc 2.12.1
Gnu Glibc 2.1.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.0.2
Gnu Glibc 2.0.1
Gnu Glibc 2.15
Gnu Glibc 2.14.1
Gnu Glibc 2.11.1
Gnu Glibc 2.11
Gnu Glibc 2.10.1
Gnu Glibc 2.0.6
Gnu Glibc 2.0.5
Gnu Glibc
Gnu Glibc 2.16
Gnu Glibc 2.11.3
Gnu Glibc 2.11.2
Gnu Glibc 2.1.1
Gnu Glibc 2.1
Gnu Glibc 2.0
Gnu Glibc 2.14
Gnu Glibc 2.13
1 EDB exploit
NA
CVE-2012-4424
Stack-based buffer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and previous versions allows context-dependent malicious users to cause a denial of service (crash) or possibly execute arbitrary code via a long string that triggers a malloc failure...
Gnu Glibc 2.15
Gnu Glibc 2.14.1
Gnu Glibc 2.14
Gnu Glibc 2.11
Gnu Glibc 2.10.1
Gnu Glibc 2.0.6
Gnu Glibc 2.0.5
Gnu Glibc 2.13
Gnu Glibc 2.12.2
Gnu Glibc 2.1.9
Gnu Glibc 2.1.3
Gnu Glibc 2.0.4
Gnu Glibc 2.0.3
Gnu Glibc 2.12.1
Gnu Glibc 2.11.3
Gnu Glibc 2.1.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.0.2
Gnu Glibc 2.0.1
Gnu Glibc
Gnu Glibc 2.16
Gnu Glibc 2.11.2
NA
CVE-2013-2207
pt_chown in GNU C Library (aka glibc or libc6) prior to 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.
Gnu Glibc 2.14
Gnu Glibc
Gnu Glibc 2.16
Gnu Glibc 2.11.2
Gnu Glibc 2.11.1
Gnu Glibc 2.1.1
Gnu Glibc 2.1
Gnu Glibc 2.0
Gnu Glibc 2.12.2
Gnu Glibc 2.12.1
Gnu Glibc 2.11.3
Gnu Glibc 2.1.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.0.2
Gnu Glibc 2.0.1
Gnu Glibc 2.13
Gnu Glibc 2.1.9
Gnu Glibc 2.1.3
Gnu Glibc 2.0.4
Gnu Glibc 2.0.3
Gnu Glibc 2.15
Gnu Glibc 2.14.1
NA
CVE-2013-4788
The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and previous versions, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent malicious users to control execution flow ...
Gnu Glibc
Gnu Glibc 2.11.3
Gnu Glibc 2.11.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.1.1
Gnu Glibc 2.0.1
Gnu Glibc 2.0
Gnu Glibc 2.14.1
Gnu Glibc 2.14
Gnu Glibc 2.10.1
Gnu Glibc 2.1.9
Gnu Glibc 2.0.5
Gnu Glibc 2.0.4
Gnu Glibc 2.13
Gnu Glibc 2.12.2
Gnu Glibc 2.12.1
Gnu Glibc 2.1.3
Gnu Glibc 2.1.2
Gnu Glibc 2.0.3
Gnu Glibc 2.0.2
Gnu Glibc 2.16
Gnu Glibc 2.15
1 EDB exploit
NA
CVE-2009-5029
Integer overflow in the __tzfile_read function in glibc prior to 2.15 allows context-dependent malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.
Gnu Glibc 2.1.2
Gnu Glibc 2.0.5
Gnu Glibc 2.0.6
Gnu Glibc 2.1.1
Gnu Glibc 2.0.3
Gnu Glibc 2.0
Gnu Glibc 2.13
Gnu Glibc 2.1.1.6
Gnu Glibc 2.1
Gnu Glibc 2.1.9
Gnu Glibc 2.0.1
Gnu Glibc 2.0.4
Gnu Glibc 2.0.2
Gnu Glibc 2.1.3
Gnu Glibc
1 EDB exploit
NA
CVE-2011-4609
The svc_run function in the RPC implementation in glibc prior to 2.15 allows remote malicious users to cause a denial of service (CPU consumption) via a large number of RPC connections.
Gnu Glibc 2.0.3
Gnu Glibc 2.0.2
Gnu Glibc 2.0.1
Gnu Glibc 2.0
Gnu Glibc 2.1.9
Gnu Glibc 2.1.3
Gnu Glibc 2.1.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.1.1
Gnu Glibc 2.13
Gnu Glibc 2.0.6
Gnu Glibc 2.0.4
Gnu Glibc
Gnu Glibc 2.1
Gnu Glibc 2.0.5
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started