Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu glibc 2.1.3.10 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0959
glibc2 does not properly clear the LD_DEBUG_OUTPUT and LD_DEBUG environmental variables when a program is spawned from a setuid program, which could allow local users to overwrite files via a symlink attack.
Gnu Glibc 2.1.3.10
NA
CVE-2004-1453
GNU glibc 2.3.4 prior to 2.3.4.20040619, 2.3.3 prior to 2.3.3.20040420, and 2.3.2 prior to 2.3.2-r10 does not restrict the use of LD_DEBUG for a setuid program, which allows local users to gain sensitive information, such as the list of symbols used by the program.
Gnu Glibc 2.0.1
Gnu Glibc 2.0.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.1.2
Gnu Glibc 2.2.4
Gnu Glibc 2.2.5
Gnu Glibc 2.0.3
Gnu Glibc 2.0.4
Gnu Glibc 2.1.3
Gnu Glibc 2.1.3.10
Gnu Glibc 2.3
Gnu Glibc 2.3.1
Gnu Glibc 2.0.5
Gnu Glibc 2.0.6
Gnu Glibc 2.1.9
Gnu Glibc 2.2
Gnu Glibc 2.2.1
Gnu Glibc 2.3.2
Gnu Glibc 2.3.3
Gnu Glibc 2.0
Gnu Glibc 2.1
Gnu Glibc 2.1.1
NA
CVE-2004-1382
The glibcbug script in glibc 2.3.4 and previous versions allows local users to overwrite arbitrary files via a symlink attack on temporary files, a different vulnerability than CVE-2004-0968.
Gnu Glibc 2.0
Gnu Glibc 2.1.1
Gnu Glibc 2.1.1.6
Gnu Glibc 2.2.2
Gnu Glibc 2.2.3
Gnu Glibc 2.3.3
Gnu Glibc 2.3.4
Gnu Glibc 2.0.3
Gnu Glibc 2.0.4
Gnu Glibc 2.0.5
Gnu Glibc 2.1.3.10
Gnu Glibc 2.1.9
Gnu Glibc 2.3
Gnu Glibc 2.3.1
Gnu Glibc 2.0.6
Gnu Glibc 2.1
Gnu Glibc 2.2
Gnu Glibc 2.2.1
Gnu Glibc 2.3.10
Gnu Glibc 2.3.2
Gnu Glibc 2.0.1
Gnu Glibc 2.0.2
NA
CVE-2010-4051
The regcomp implementation in the GNU C Library (aka glibc or libc6) up to and including 2.11.3, and 2.12.x up to and including 2.12.2, allows context-dependent malicious users to cause a denial of service (application crash) via a regular expression containing adjacent bounded r...
Gnu Glibc 2.1.2
Gnu Glibc 2.11
Gnu Glibc 2.10.1
Gnu Glibc 1.00
Gnu Glibc 1.06
Gnu Glibc 2.1.1
Gnu Glibc 1.02
Gnu Glibc 1.07
Gnu Glibc 2.12.0
Gnu Glibc 2.1.1.6
Gnu Glibc 1.04
Gnu Glibc 1.01
Gnu Glibc 2.1
Gnu Glibc 1.09.1
Gnu Glibc 2.1.9
Gnu Glibc 2.12.1
Gnu Glibc 1.09
Gnu Glibc 2.10
Gnu Glibc 2.11.2
Gnu Glibc 1.03
Gnu Glibc 2.1.3.10
Gnu Glibc 2.11.3
1 EDB exploit
NA
CVE-2010-4052
Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or libc6) up to and including 2.11.3, and 2.12.x up to and including 2.12.2, allows context-dependent malicious users to cause a denial of service (resource exhaustion) via a regular exp...
Gnu Glibc 1.00
Gnu Glibc 1.01
Gnu Glibc 1.07
Gnu Glibc 1.06
Gnu Glibc 2.1.3.10
Gnu Glibc 2.1.9
Gnu Glibc 2.11.3
Gnu Glibc 2.12.2
Gnu Glibc 1.09.1
Gnu Glibc 1.09
Gnu Glibc 1.08
Gnu Glibc 2.1.2
Gnu Glibc 2.1.3
Gnu Glibc 2.10
Gnu Glibc 2.10.1
Gnu Glibc 1.05
Gnu Glibc 1.04
Gnu Glibc 2.1
Gnu Glibc 2.10.2
Gnu Glibc 2.12.0
Gnu Glibc 2.12.1
Gnu Glibc 2.11
2 EDB exploits
NA
CVE-2004-0968
The catchsegv script in glibc 2.3.2 and previous versions allows local users to overwrite files via a symlink attack on temporary files.
Gnu Glibc 2.0.5
Gnu Glibc 2.0.6
Gnu Glibc 2.1.9
Gnu Glibc 2.2
Gnu Glibc 2.3.1
Gnu Glibc 2.3.10
Gnu Glibc 2.1
Gnu Glibc 2.1.1
Gnu Glibc 2.2.1
Gnu Glibc 2.2.2
Gnu Glibc 2.3.2
Gnu Glibc 2.3.3
Gnu Glibc 2.0
Gnu Glibc 2.0.1
Gnu Glibc 2.0.2
Gnu Glibc 2.1.1.6
Gnu Glibc 2.1.2
Gnu Glibc 2.2.3
Gnu Glibc 2.2.4
Gnu Glibc 2.3.4
Gnu Glibc 2.0.3
Gnu Glibc 2.0.4
NA
CVE-2009-4881
Integer overflow in the __vstrfmon_l function in stdlib/strfmon_l.c in the strfmon implementation in the GNU C Library (aka glibc or libc6) prior to 2.10.1 allows context-dependent malicious users to cause a denial of service (application crash) via a crafted format string, as de...
Gnu Glibc 2.2.2
Gnu Glibc 2.7
Gnu Glibc 2.1.2
Gnu Glibc 2.0.5
Gnu Glibc 2.2.5
Gnu Glibc 2.0.6
Gnu Glibc 1.00
Gnu Glibc 1.06
Gnu Glibc 2.1.1
Gnu Glibc 1.02
Gnu Glibc 2.0.3
Gnu Glibc 1.07
Gnu Glibc 2.3.1
Gnu Glibc 2.3
Gnu Glibc 2.0
Gnu Glibc 2.1.1.6
Gnu Glibc 1.04
Gnu Glibc 1.01
Gnu Glibc 2.3.10
Gnu Glibc 2.4
Gnu Glibc 2.1
Gnu Glibc 2.3.4
NA
CVE-2010-3847
elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) up to and including 2.11.2, and 2.12.x up to and including 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic...
Gnu Glibc 2.2.2
Gnu Glibc 2.9
Gnu Glibc 2.7
Gnu Glibc 2.1.2
Gnu Glibc 2.11
Gnu Glibc 2.0.5
Gnu Glibc 2.2.5
Gnu Glibc 2.0.6
Gnu Glibc 2.10.1
Gnu Glibc 1.00
Gnu Glibc 1.06
Gnu Glibc 2.1.1
Gnu Glibc 1.02
Gnu Glibc 2.0.3
Gnu Glibc 1.07
Gnu Glibc 2.3.1
Gnu Glibc 2.3
Gnu Glibc 2.12.0
Gnu Glibc 2.0
Gnu Glibc 2.1.1.6
Gnu Glibc 1.04
Gnu Glibc 1.01
4 EDB exploits
1 Github repository
NA
CVE-2010-3856
ld.so in the GNU C Library (aka glibc or libc6) prior to 2.11.3, and 2.12.x prior to 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging ...
Gnu Glibc 2.2.2
Gnu Glibc 2.9
Gnu Glibc 2.7
Gnu Glibc 2.1.2
Gnu Glibc 2.11
Gnu Glibc 2.0.5
Gnu Glibc 2.2.5
Gnu Glibc 2.0.6
Gnu Glibc 2.10.1
Gnu Glibc 1.00
Gnu Glibc 1.06
Gnu Glibc 2.1.1
Gnu Glibc 1.02
Gnu Glibc 2.0.3
Gnu Glibc 1.07
Gnu Glibc 2.3.1
Gnu Glibc 2.3
Gnu Glibc 2.12.0
Gnu Glibc 2.0
Gnu Glibc 2.1.1.6
Gnu Glibc 1.04
Gnu Glibc 1.01
3 EDB exploits
NA
CVE-2011-1089
The addmntent function in the GNU C Library (aka glibc or libc6) 2.13 and previous versions does not report an error status for failed attempts to write to the /etc/mtab file, which makes it easier for local users to trigger corruption of this file, as demonstrated by writes from...
Gnu Glibc 1.03
Gnu Glibc 1.02
Gnu Glibc 1.09
Gnu Glibc 1.08
Gnu Glibc 2.0.5
Gnu Glibc 2.0.4
Gnu Glibc 2.0.3
Gnu Glibc 2.0.2
Gnu Glibc 2.0.1
Gnu Glibc 2.1.2
Gnu Glibc 2.1.3
Gnu Glibc 2.1.3.10
Gnu Glibc 2.1.9
Gnu Glibc 2.11.3
Gnu Glibc 2.11.2
Gnu Glibc 2.12.2
Gnu Glibc
Gnu Glibc 2.3.5
Gnu Glibc 2.8
Gnu Glibc 2.9
Gnu Glibc 2.10
Gnu Glibc 2.2.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »