Логотип exploitDog
bind:"CVE-2012-1568" OR bind:"CVE-2012-4444" OR bind:"CVE-2012-5515"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2012-1568" OR bind:"CVE-2012-4444" OR bind:"CVE-2012-5515"

Количество 23

Количество 23

oracle-oval логотип

ELSA-2013-0168

больше 12 лет назад

ELSA-2013-0168: kernel security and bug fix update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2013-0168-1

больше 12 лет назад

ELSA-2013-0168-1: kernel security and bug fix update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2012-1568

больше 12 лет назад

The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.

CVSS2: 1.9
EPSS: Низкий
redhat логотип

CVE-2012-1568

больше 13 лет назад

The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.

CVSS2: 1.9
EPSS: Низкий
nvd логотип

CVE-2012-1568

больше 12 лет назад

The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.

CVSS2: 1.9
EPSS: Низкий
debian логотип

CVE-2012-1568

больше 12 лет назад

The ExecShield feature in a certain Red Hat patch for the Linux kernel ...

CVSS2: 1.9
EPSS: Низкий
github логотип

GHSA-vp43-m2w7-p2vc

около 3 лет назад

The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.

EPSS: Низкий
ubuntu логотип

CVE-2012-5515

больше 12 лет назад

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.

CVSS2: 4.7
EPSS: Низкий
redhat логотип

CVE-2012-5515

больше 12 лет назад

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.

CVSS2: 5.5
EPSS: Низкий
nvd логотип

CVE-2012-5515

больше 12 лет назад

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.

CVSS2: 4.7
EPSS: Низкий
debian логотип

CVE-2012-5515

больше 12 лет назад

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and ...

CVSS2: 4.7
EPSS: Низкий
ubuntu логотип

CVE-2012-4444

больше 12 лет назад

The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.

CVSS2: 5
EPSS: Низкий
redhat логотип

CVE-2012-4444

больше 15 лет назад

The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.

CVSS2: 2.6
EPSS: Низкий
nvd логотип

CVE-2012-4444

больше 12 лет назад

The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2012-4444

больше 12 лет назад

The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kern ...

CVSS2: 5
EPSS: Низкий
oracle-oval логотип

ELSA-2012-1426

больше 12 лет назад

ELSA-2012-1426: kernel security and bug fix update (MODERATE)

EPSS: Низкий
github логотип

GHSA-h2f3-x3v9-p3c5

около 3 лет назад

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.

EPSS: Низкий
github логотип

GHSA-q7cx-6c9q-7hf5

около 3 лет назад

The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.

EPSS: Низкий
oracle-oval логотип

ELSA-2012-2048

больше 12 лет назад

ELSA-2012-2048: Unbreakable Enterprise kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2012-1580

больше 12 лет назад

ELSA-2012-1580: kernel security, bug fix and enhancement update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2013-0168

ELSA-2013-0168: kernel security and bug fix update (MODERATE)

больше 12 лет назад
oracle-oval логотип
ELSA-2013-0168-1

ELSA-2013-0168-1: kernel security and bug fix update (MODERATE)

больше 12 лет назад
ubuntu логотип
CVE-2012-1568

The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.

CVSS2: 1.9
0%
Низкий
больше 12 лет назад
redhat логотип
CVE-2012-1568

The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.

CVSS2: 1.9
0%
Низкий
больше 13 лет назад
nvd логотип
CVE-2012-1568

The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.

CVSS2: 1.9
0%
Низкий
больше 12 лет назад
debian логотип
CVE-2012-1568

The ExecShield feature in a certain Red Hat patch for the Linux kernel ...

CVSS2: 1.9
0%
Низкий
больше 12 лет назад
github логотип
GHSA-vp43-m2w7-p2vc

The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.

0%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2012-5515

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.

CVSS2: 4.7
0%
Низкий
больше 12 лет назад
redhat логотип
CVE-2012-5515

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.

CVSS2: 5.5
0%
Низкий
больше 12 лет назад
nvd логотип
CVE-2012-5515

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.

CVSS2: 4.7
0%
Низкий
больше 12 лет назад
debian логотип
CVE-2012-5515

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and ...

CVSS2: 4.7
0%
Низкий
больше 12 лет назад
ubuntu логотип
CVE-2012-4444

The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.

CVSS2: 5
3%
Низкий
больше 12 лет назад
redhat логотип
CVE-2012-4444

The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.

CVSS2: 2.6
3%
Низкий
больше 15 лет назад
nvd логотип
CVE-2012-4444

The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.

CVSS2: 5
3%
Низкий
больше 12 лет назад
debian логотип
CVE-2012-4444

The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kern ...

CVSS2: 5
3%
Низкий
больше 12 лет назад
oracle-oval логотип
ELSA-2012-1426

ELSA-2012-1426: kernel security and bug fix update (MODERATE)

больше 12 лет назад
github логотип
GHSA-h2f3-x3v9-p3c5

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.

0%
Низкий
около 3 лет назад
github логотип
GHSA-q7cx-6c9q-7hf5

The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.

3%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2012-2048

ELSA-2012-2048: Unbreakable Enterprise kernel security update (MODERATE)

больше 12 лет назад
oracle-oval логотип
ELSA-2012-1580

ELSA-2012-1580: kernel security, bug fix and enhancement update (MODERATE)

больше 12 лет назад

Уязвимостей на страницу