Логотип exploitDog
bind:"CVE-2022-23218" OR bind:"CVE-2022-23219" OR bind:"CVE-2021-3999"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2022-23218" OR bind:"CVE-2022-23219" OR bind:"CVE-2021-3999"

Количество 34

Количество 34

redhat логотип

CVE-2021-3999

около 4 лет назад

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2021-3999

больше 3 лет назад

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2021-3999

больше 3 лет назад

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2021-3999

больше 3 лет назад

A flaw was found in glibc. An off-by-one buffer overflow and underflow ...

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2022-23219

около 4 лет назад

The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2022-23219

около 8 лет назад

The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2022-23219

около 4 лет назад

The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

CVSS3: 9.8
EPSS: Низкий
msrc логотип

CVE-2022-23219

почти 4 года назад

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2022-23219

около 4 лет назад

The deprecated compatibility function clnt_create in the sunrpc module ...

CVSS3: 9.8
EPSS: Низкий
rocky логотип

RLSA-2022:896

почти 4 года назад

Moderate: glibc security update

EPSS: Низкий
github логотип

GHSA-vfch-2fr8-r5c2

больше 3 лет назад

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2022-01635

почти 4 года назад

Уязвимость функции getcwd() системной библиотеки glibc, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-fhxm-4mc9-6jf5

около 4 лет назад

The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2022-01633

почти 4 года назад

Уязвимость модуля sunrpc системной библиотеки glibc, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2021-3999

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVSS3: 7.4
1%
Низкий
около 4 лет назад
nvd логотип
CVE-2021-3999

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVSS3: 7.8
1%
Низкий
больше 3 лет назад
msrc логотип
CVE-2021-3999

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVSS3: 7.8
1%
Низкий
больше 3 лет назад
debian логотип
CVE-2021-3999

A flaw was found in glibc. An off-by-one buffer overflow and underflow ...

CVSS3: 7.8
1%
Низкий
больше 3 лет назад
ubuntu логотип
CVE-2022-23219

The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

CVSS3: 9.8
1%
Низкий
около 4 лет назад
redhat логотип
CVE-2022-23219

The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

CVSS3: 7
1%
Низкий
около 8 лет назад
nvd логотип
CVE-2022-23219

The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

CVSS3: 9.8
1%
Низкий
около 4 лет назад
msrc логотип
CVSS3: 9.8
1%
Низкий
почти 4 года назад
debian логотип
CVE-2022-23219

The deprecated compatibility function clnt_create in the sunrpc module ...

CVSS3: 9.8
1%
Низкий
около 4 лет назад
rocky логотип
RLSA-2022:896

Moderate: glibc security update

1%
Низкий
почти 4 года назад
github логотип
GHSA-vfch-2fr8-r5c2

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVSS3: 7.8
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-01635

Уязвимость функции getcwd() системной библиотеки glibc, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
1%
Низкий
почти 4 года назад
github логотип
GHSA-fhxm-4mc9-6jf5

The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

CVSS3: 9.8
1%
Низкий
около 4 лет назад
fstec логотип
BDU:2022-01633

Уязвимость модуля sunrpc системной библиотеки glibc, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
1%
Низкий
почти 4 года назад

Уязвимостей на страницу