Количество 13
Количество 13

CVE-2016-3075
Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.

CVE-2016-3075
Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.

CVE-2016-3075
Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.
CVE-2016-3075
Stack-based buffer overflow in the nss_dns implementation of the getne ...
GHSA-7x96-w64p-8chw
Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.
ELSA-2016-3638
ELSA-2016-3638: glibc security update (LOW)
ELSA-2016-2573
ELSA-2016-2573: glibc security, bug fix, and enhancement update (LOW)

openSUSE-SU-2016:1779-1
Security update for glibc

SUSE-SU-2016:2156-1
Security update for glibc

SUSE-SU-2016:1733-1
Security update for glibc

SUSE-SU-2016:1721-1
Security update for glibc

SUSE-SU-2017:2699-1
Security update for SLES 12 Docker image

SUSE-SU-2017:2700-1
Security update for SLES 12-SP1 Docker image
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2016-3075 Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name. | CVSS3: 7.5 | 11% Средний | больше 9 лет назад |
![]() | CVE-2016-3075 Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name. | CVSS3: 7 | 11% Средний | больше 9 лет назад |
![]() | CVE-2016-3075 Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name. | CVSS3: 7.5 | 11% Средний | больше 9 лет назад |
CVE-2016-3075 Stack-based buffer overflow in the nss_dns implementation of the getne ... | CVSS3: 7.5 | 11% Средний | больше 9 лет назад | |
GHSA-7x96-w64p-8chw Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name. | CVSS3: 7.5 | 11% Средний | больше 3 лет назад | |
ELSA-2016-3638 ELSA-2016-3638: glibc security update (LOW) | почти 9 лет назад | |||
ELSA-2016-2573 ELSA-2016-2573: glibc security, bug fix, and enhancement update (LOW) | почти 9 лет назад | |||
![]() | openSUSE-SU-2016:1779-1 Security update for glibc | около 9 лет назад | ||
![]() | SUSE-SU-2016:2156-1 Security update for glibc | около 9 лет назад | ||
![]() | SUSE-SU-2016:1733-1 Security update for glibc | около 9 лет назад | ||
![]() | SUSE-SU-2016:1721-1 Security update for glibc | около 9 лет назад | ||
![]() | SUSE-SU-2017:2699-1 Security update for SLES 12 Docker image | почти 8 лет назад | ||
![]() | SUSE-SU-2017:2700-1 Security update for SLES 12-SP1 Docker image | почти 8 лет назад |
Уязвимостей на страницу