Количество 9
Количество 9

CVE-2012-0864
Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.

CVE-2012-0864
Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.

CVE-2012-0864
Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.
CVE-2012-0864
Integer overflow in the vfprintf function in stdio-common/vfprintf.c i ...
GHSA-x2p4-f3vf-gwp3
Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.
ELSA-2012-0397
ELSA-2012-0397: glibc security update (MODERATE)
ELSA-2012-0393
ELSA-2012-0393: glibc security and bug fix update (MODERATE)

BDU:2015-09685
Уязвимости операционной системы Gentoo Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

SUSE-SU-2015:0551-1
Security update for glibc
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2012-0864 Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments. | CVSS2: 6.8 | 2% Низкий | больше 12 лет назад |
![]() | CVE-2012-0864 Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments. | CVSS2: 6.8 | 2% Низкий | почти 15 лет назад |
![]() | CVE-2012-0864 Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments. | CVSS2: 6.8 | 2% Низкий | больше 12 лет назад |
CVE-2012-0864 Integer overflow in the vfprintf function in stdio-common/vfprintf.c i ... | CVSS2: 6.8 | 2% Низкий | больше 12 лет назад | |
GHSA-x2p4-f3vf-gwp3 Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments. | 2% Низкий | больше 3 лет назад | ||
ELSA-2012-0397 ELSA-2012-0397: glibc security update (MODERATE) | больше 13 лет назад | |||
ELSA-2012-0393 ELSA-2012-0393: glibc security and bug fix update (MODERATE) | больше 13 лет назад | |||
![]() | BDU:2015-09685 Уязвимости операционной системы Gentoo Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации | CVSS2: 6.9 | больше 11 лет назад | |
![]() | SUSE-SU-2015:0551-1 Security update for glibc | почти 12 лет назад |
Уязвимостей на страницу