Логотип exploitDog
bind:"CVE-2015-7547" OR bind:"CVE-2015-5229"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2015-7547" OR bind:"CVE-2015-5229"

Количество 23

Количество 23

oracle-oval логотип

ELSA-2016-0176

больше 9 лет назад

ELSA-2016-0176: glibc security and bug fix update (CRITICAL)

EPSS: Низкий
ubuntu логотип

CVE-2015-5229

больше 9 лет назад

The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2015-5229

около 10 лет назад

The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.

CVSS2: 2.6
EPSS: Низкий
nvd логотип

CVE-2015-5229

больше 9 лет назад

The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2015-5229

больше 9 лет назад

The calloc function in the glibc package in Red Hat Enterprise Linux ( ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2015-7547

больше 9 лет назад

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVSS3: 8.1
EPSS: Критический
redhat логотип

CVE-2015-7547

больше 9 лет назад

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVSS2: 6.8
EPSS: Критический
nvd логотип

CVE-2015-7547

больше 9 лет назад

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVSS3: 8.1
EPSS: Критический
debian логотип

CVE-2015-7547

больше 9 лет назад

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_ ...

CVSS3: 8.1
EPSS: Критический
github логотип

GHSA-vhfq-hmc6-hfjh

больше 3 лет назад

The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-RU-2016:0496-1

больше 9 лет назад

Recommended update for certification-sles-eal4

EPSS: Критический
github логотип

GHSA-5xr7-h7cp-w9pc

больше 3 лет назад

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVSS3: 8.1
EPSS: Критический
oracle-oval логотип

ELSA-2016-0175

больше 9 лет назад

ELSA-2016-0175: glibc security and bug fix update (CRITICAL)

EPSS: Низкий
fstec логотип

BDU:2017-00283

больше 9 лет назад

Уязвимости библиотеки, обеспечивающей системные вызовы и основные функции, glibc, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код

CVSS2: 6.8
EPSS: Критический
fstec логотип

BDU:2016-00434

больше 9 лет назад

Уязвимость библиотеки glibc, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

CVSS2: 9.3
EPSS: Критический
suse-cvrf логотип

openSUSE-SU-2016:0490-1

больше 9 лет назад

Security update for glibc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:0473-1

больше 9 лет назад

Security update for glibc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:0472-1

больше 9 лет назад

Security update for glibc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:0471-1

больше 9 лет назад

Security update for glibc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:0470-1

больше 9 лет назад

Security update for glibc

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2016-0176

ELSA-2016-0176: glibc security and bug fix update (CRITICAL)

больше 9 лет назад
ubuntu логотип
CVE-2015-5229

The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.

CVSS3: 7.5
1%
Низкий
больше 9 лет назад
redhat логотип
CVE-2015-5229

The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.

CVSS2: 2.6
1%
Низкий
около 10 лет назад
nvd логотип
CVE-2015-5229

The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.

CVSS3: 7.5
1%
Низкий
больше 9 лет назад
debian логотип
CVE-2015-5229

The calloc function in the glibc package in Red Hat Enterprise Linux ( ...

CVSS3: 7.5
1%
Низкий
больше 9 лет назад
ubuntu логотип
CVE-2015-7547

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVSS3: 8.1
93%
Критический
больше 9 лет назад
redhat логотип
CVE-2015-7547

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVSS2: 6.8
93%
Критический
больше 9 лет назад
nvd логотип
CVE-2015-7547

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVSS3: 8.1
93%
Критический
больше 9 лет назад
debian логотип
CVE-2015-7547

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_ ...

CVSS3: 8.1
93%
Критический
больше 9 лет назад
github логотип
GHSA-vhfq-hmc6-hfjh

The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.

CVSS3: 7.5
1%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-RU-2016:0496-1

Recommended update for certification-sles-eal4

93%
Критический
больше 9 лет назад
github логотип
GHSA-5xr7-h7cp-w9pc

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVSS3: 8.1
93%
Критический
больше 3 лет назад
oracle-oval логотип
ELSA-2016-0175

ELSA-2016-0175: glibc security and bug fix update (CRITICAL)

больше 9 лет назад
fstec логотип
BDU:2017-00283

Уязвимости библиотеки, обеспечивающей системные вызовы и основные функции, glibc, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код

CVSS2: 6.8
93%
Критический
больше 9 лет назад
fstec логотип
BDU:2016-00434

Уязвимость библиотеки glibc, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

CVSS2: 9.3
93%
Критический
больше 9 лет назад
suse-cvrf логотип
openSUSE-SU-2016:0490-1

Security update for glibc

больше 9 лет назад
suse-cvrf логотип
SUSE-SU-2016:0473-1

Security update for glibc

больше 9 лет назад
suse-cvrf логотип
SUSE-SU-2016:0472-1

Security update for glibc

больше 9 лет назад
suse-cvrf логотип
SUSE-SU-2016:0471-1

Security update for glibc

больше 9 лет назад
suse-cvrf логотип
SUSE-SU-2016:0470-1

Security update for glibc

больше 9 лет назад

Уязвимостей на страницу