Логотип exploitDog
bind: "CVE-2023-0687"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-0687"

Количество 11

Количество 11

ubuntu логотип

CVE-2023-0687

почти 3 года назад

A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled.

CVSS3: 4.6
EPSS: Низкий
redhat логотип

CVE-2023-0687

почти 3 года назад

A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled.

EPSS: Низкий
nvd логотип

CVE-2023-0687

почти 3 года назад

A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled.

CVSS3: 4.6
EPSS: Низкий
msrc логотип

CVE-2023-0687

2 месяца назад

A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled.

CVSS3: 4.6
EPSS: Низкий
debian логотип

CVE-2023-0687

почти 3 года назад

A vulnerability was found in GNU C Library 2.38. It has been declared ...

CVSS3: 4.6
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1718-1

больше 2 лет назад

Security update for glibc

EPSS: Низкий
redos логотип

ROS-20230210-03

почти 3 года назад

Уязвимость GNU C Library

CVSS3: 4.6
EPSS: Низкий
github логотип

GHSA-5r4p-4pqv-gqhw

почти 3 года назад

A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2023-00731

почти 3 года назад

Уязвимость функции __monstartup файла gmon.c библиотеки системных вызовов и основных функций GNU C (glibc), позволяющая нарушителю позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 4.6
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3825-1

около 2 лет назад

Security update for binutils

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3695-1

около 2 лет назад

Security update for binutils

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-0687

A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled.

CVSS3: 4.6
0%
Низкий
почти 3 года назад
redhat логотип
CVE-2023-0687

A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled.

0%
Низкий
почти 3 года назад
nvd логотип
CVE-2023-0687

A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled.

CVSS3: 4.6
0%
Низкий
почти 3 года назад
msrc логотип
CVE-2023-0687

A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled.

CVSS3: 4.6
0%
Низкий
2 месяца назад
debian логотип
CVE-2023-0687

A vulnerability was found in GNU C Library 2.38. It has been declared ...

CVSS3: 4.6
0%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:1718-1

Security update for glibc

0%
Низкий
больше 2 лет назад
redos логотип
ROS-20230210-03

Уязвимость GNU C Library

CVSS3: 4.6
0%
Низкий
почти 3 года назад
github логотип
GHSA-5r4p-4pqv-gqhw

A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability.

CVSS3: 9.8
0%
Низкий
почти 3 года назад
fstec логотип
BDU:2023-00731

Уязвимость функции __monstartup файла gmon.c библиотеки системных вызовов и основных функций GNU C (glibc), позволяющая нарушителю позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 4.6
0%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:3825-1

Security update for binutils

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:3695-1

Security update for binutils

около 2 лет назад

Уязвимостей на страницу