Логотип exploitDog
bind:"CVE-2023-4806" OR bind:"CVE-2023-4911" OR bind:"CVE-2023-4527" OR bind:"CVE-2023-4813"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-4806" OR bind:"CVE-2023-4911" OR bind:"CVE-2023-4527" OR bind:"CVE-2023-4813"

Количество 40

Количество 40

oracle-oval логотип

ELSA-2023-12851

около 2 лет назад

ELSA-2023-12851: glibc security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-12850

около 2 лет назад

ELSA-2023-12850: glibc security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2023-06269

около 2 лет назад

Уязвимость динамического загрузчика ld.so библиотеки glibc, позволяющая нарушителю выполнить произвольный код c повышенными привилегиями

CVSS3: 7.8
EPSS: Высокий
ubuntu логотип

CVE-2023-4527

около 2 лет назад

A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2023-4527

около 2 лет назад

A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2023-4527

около 2 лет назад

A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2023-4527

4 месяца назад

Glibc: stack read overflow in getaddrinfo in no-aaaa mode

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2023-4527

около 2 лет назад

A flaw was found in glibc. When the getaddrinfo function is called wit ...

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2023-4813

около 2 лет назад

A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2023-4813

больше 3 лет назад

A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2023-4813

около 2 лет назад

A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.

CVSS3: 5.9
EPSS: Низкий
msrc логотип

CVE-2023-4813

около 1 месяца назад

Glibc: potential use-after-free in gaih_inet()

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2023-4813

около 2 лет назад

A flaw has been identified in glibc. In an uncommon situation, the gai ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-hmf7-f8gf-8f4p

около 2 лет назад

A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2023-06332

около 2 лет назад

Уязвимость функции getaddrinfo системной библиотеки glibc, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4110-1

около 2 лет назад

Security update for glibc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4047-1

около 2 лет назад

Security update for glibc

EPSS: Низкий
suse-cvrf логотип

SUSE-RU-2023:4063-1

около 2 лет назад

Recommended update for glibc

EPSS: Низкий
github логотип

GHSA-qx6j-g797-jg9r

около 2 лет назад

A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2023-05969

около 2 лет назад

Уязвимость компонента nsswitch.conf библиотеки, обеспечивающей системные вызовы и основные функции glibc, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2023-12851

ELSA-2023-12851: glibc security update (IMPORTANT)

около 2 лет назад
oracle-oval логотип
ELSA-2023-12850

ELSA-2023-12850: glibc security update (IMPORTANT)

около 2 лет назад
fstec логотип
BDU:2023-06269

Уязвимость динамического загрузчика ld.so библиотеки glibc, позволяющая нарушителю выполнить произвольный код c повышенными привилегиями

CVSS3: 7.8
78%
Высокий
около 2 лет назад
ubuntu логотип
CVE-2023-4527

A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-4527

A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-4527

A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
msrc логотип
CVE-2023-4527

Glibc: stack read overflow in getaddrinfo in no-aaaa mode

CVSS3: 6.5
0%
Низкий
4 месяца назад
debian логотип
CVE-2023-4527

A flaw was found in glibc. When the getaddrinfo function is called wit ...

CVSS3: 6.5
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-4813

A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.

CVSS3: 5.9
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-4813

A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.

CVSS3: 5.9
0%
Низкий
больше 3 лет назад
nvd логотип
CVE-2023-4813

A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.

CVSS3: 5.9
0%
Низкий
около 2 лет назад
msrc логотип
CVE-2023-4813

Glibc: potential use-after-free in gaih_inet()

CVSS3: 5.9
0%
Низкий
около 1 месяца назад
debian логотип
CVE-2023-4813

A flaw has been identified in glibc. In an uncommon situation, the gai ...

CVSS3: 5.9
0%
Низкий
около 2 лет назад
github логотип
GHSA-hmf7-f8gf-8f4p

A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-06332

Уязвимость функции getaddrinfo системной библиотеки glibc, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:4110-1

Security update for glibc

0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:4047-1

Security update for glibc

0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-RU-2023:4063-1

Recommended update for glibc

0%
Низкий
около 2 лет назад
github логотип
GHSA-qx6j-g797-jg9r

A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.

CVSS3: 5.9
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-05969

Уязвимость компонента nsswitch.conf библиотеки, обеспечивающей системные вызовы и основные функции glibc, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.9
0%
Низкий
около 2 лет назад

Уязвимостей на страницу