Логотип exploitDog
bind:"CVE-2015-7547" OR bind:"CVE-2015-5229"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2015-7547" OR bind:"CVE-2015-5229"

Количество 23

Количество 23

oracle-oval логотип

ELSA-2016-0176

почти 10 лет назад

ELSA-2016-0176: glibc security and bug fix update (CRITICAL)

EPSS: Низкий
ubuntu логотип

CVE-2015-5229

почти 10 лет назад

The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2015-5229

больше 10 лет назад

The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.

CVSS2: 2.6
EPSS: Низкий
nvd логотип

CVE-2015-5229

почти 10 лет назад

The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2015-5229

почти 10 лет назад

The calloc function in the glibc package in Red Hat Enterprise Linux ( ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2015-7547

почти 10 лет назад

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVSS3: 8.1
EPSS: Критический
redhat логотип

CVE-2015-7547

почти 10 лет назад

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVSS2: 6.8
EPSS: Критический
nvd логотип

CVE-2015-7547

почти 10 лет назад

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVSS3: 8.1
EPSS: Критический
debian логотип

CVE-2015-7547

почти 10 лет назад

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_ ...

CVSS3: 8.1
EPSS: Критический
github логотип

GHSA-vhfq-hmc6-hfjh

больше 3 лет назад

The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-RU-2016:0496-1

почти 10 лет назад

Recommended update for certification-sles-eal4

EPSS: Критический
github логотип

GHSA-5xr7-h7cp-w9pc

больше 3 лет назад

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVSS3: 8.1
EPSS: Критический
oracle-oval логотип

ELSA-2016-0175

почти 10 лет назад

ELSA-2016-0175: glibc security and bug fix update (CRITICAL)

EPSS: Низкий
fstec логотип

BDU:2017-00283

почти 10 лет назад

Уязвимости библиотеки, обеспечивающей системные вызовы и основные функции, glibc, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код

CVSS2: 6.8
EPSS: Критический
fstec логотип

BDU:2016-00434

почти 10 лет назад

Уязвимость библиотеки glibc, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

CVSS2: 9.3
EPSS: Критический
suse-cvrf логотип

openSUSE-SU-2016:0490-1

почти 10 лет назад

Security update for glibc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:0473-1

почти 10 лет назад

Security update for glibc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:0472-1

почти 10 лет назад

Security update for glibc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:0471-1

почти 10 лет назад

Security update for glibc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:0470-1

почти 10 лет назад

Security update for glibc

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2016-0176

ELSA-2016-0176: glibc security and bug fix update (CRITICAL)

почти 10 лет назад
ubuntu логотип
CVE-2015-5229

The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.

CVSS3: 7.5
1%
Низкий
почти 10 лет назад
redhat логотип
CVE-2015-5229

The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.

CVSS2: 2.6
1%
Низкий
больше 10 лет назад
nvd логотип
CVE-2015-5229

The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.

CVSS3: 7.5
1%
Низкий
почти 10 лет назад
debian логотип
CVE-2015-5229

The calloc function in the glibc package in Red Hat Enterprise Linux ( ...

CVSS3: 7.5
1%
Низкий
почти 10 лет назад
ubuntu логотип
CVE-2015-7547

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVSS3: 8.1
94%
Критический
почти 10 лет назад
redhat логотип
CVE-2015-7547

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVSS2: 6.8
94%
Критический
почти 10 лет назад
nvd логотип
CVE-2015-7547

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVSS3: 8.1
94%
Критический
почти 10 лет назад
debian логотип
CVE-2015-7547

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_ ...

CVSS3: 8.1
94%
Критический
почти 10 лет назад
github логотип
GHSA-vhfq-hmc6-hfjh

The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.

CVSS3: 7.5
1%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-RU-2016:0496-1

Recommended update for certification-sles-eal4

94%
Критический
почти 10 лет назад
github логотип
GHSA-5xr7-h7cp-w9pc

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVSS3: 8.1
94%
Критический
больше 3 лет назад
oracle-oval логотип
ELSA-2016-0175

ELSA-2016-0175: glibc security and bug fix update (CRITICAL)

почти 10 лет назад
fstec логотип
BDU:2017-00283

Уязвимости библиотеки, обеспечивающей системные вызовы и основные функции, glibc, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код

CVSS2: 6.8
94%
Критический
почти 10 лет назад
fstec логотип
BDU:2016-00434

Уязвимость библиотеки glibc, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

CVSS2: 9.3
94%
Критический
почти 10 лет назад
suse-cvrf логотип
openSUSE-SU-2016:0490-1

Security update for glibc

почти 10 лет назад
suse-cvrf логотип
SUSE-SU-2016:0473-1

Security update for glibc

почти 10 лет назад
suse-cvrf логотип
SUSE-SU-2016:0472-1

Security update for glibc

почти 10 лет назад
suse-cvrf логотип
SUSE-SU-2016:0471-1

Security update for glibc

почти 10 лет назад
suse-cvrf логотип
SUSE-SU-2016:0470-1

Security update for glibc

почти 10 лет назад

Уязвимостей на страницу