Логотип exploitDog
bind:"CVE-2013-6435" OR bind:"CVE-2014-8118"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2013-6435" OR bind:"CVE-2014-8118"

Количество 13

Количество 13

oracle-oval логотип

ELSA-2014-1976

больше 10 лет назад

ELSA-2014-1976: rpm security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2014-8118

больше 10 лет назад

Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow.

CVSS2: 10
EPSS: Средний
redhat логотип

CVE-2014-8118

больше 10 лет назад

Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow.

CVSS2: 7.6
EPSS: Средний
nvd логотип

CVE-2014-8118

больше 10 лет назад

Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow.

CVSS2: 10
EPSS: Средний
debian логотип

CVE-2014-8118

больше 10 лет назад

Integer overflow in RPM 4.12 and earlier allows remote attackers to ex ...

CVSS2: 10
EPSS: Средний
ubuntu логотип

CVE-2013-6435

больше 10 лет назад

Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.

CVSS2: 7.6
EPSS: Низкий
redhat логотип

CVE-2013-6435

больше 10 лет назад

Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.

CVSS2: 7.6
EPSS: Низкий
nvd логотип

CVE-2013-6435

больше 10 лет назад

Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.

CVSS2: 7.6
EPSS: Низкий
debian логотип

CVE-2013-6435

больше 10 лет назад

Race condition in RPM 4.11.1 and earlier allows remote attackers to ex ...

CVSS2: 7.6
EPSS: Низкий
github логотип

GHSA-wj3v-j872-6xqx

больше 3 лет назад

Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow.

EPSS: Средний
github логотип

GHSA-qww5-w98g-66q7

больше 3 лет назад

Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.

EPSS: Низкий
oracle-oval логотип

ELSA-2014-1974

больше 10 лет назад

ELSA-2014-1974: rpm security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2015-07494

больше 10 лет назад

Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 9.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2014-1976

ELSA-2014-1976: rpm security update (IMPORTANT)

больше 10 лет назад
ubuntu логотип
CVE-2014-8118

Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow.

CVSS2: 10
12%
Средний
больше 10 лет назад
redhat логотип
CVE-2014-8118

Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow.

CVSS2: 7.6
12%
Средний
больше 10 лет назад
nvd логотип
CVE-2014-8118

Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow.

CVSS2: 10
12%
Средний
больше 10 лет назад
debian логотип
CVE-2014-8118

Integer overflow in RPM 4.12 and earlier allows remote attackers to ex ...

CVSS2: 10
12%
Средний
больше 10 лет назад
ubuntu логотип
CVE-2013-6435

Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.

CVSS2: 7.6
7%
Низкий
больше 10 лет назад
redhat логотип
CVE-2013-6435

Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.

CVSS2: 7.6
7%
Низкий
больше 10 лет назад
nvd логотип
CVE-2013-6435

Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.

CVSS2: 7.6
7%
Низкий
больше 10 лет назад
debian логотип
CVE-2013-6435

Race condition in RPM 4.11.1 and earlier allows remote attackers to ex ...

CVSS2: 7.6
7%
Низкий
больше 10 лет назад
github логотип
GHSA-wj3v-j872-6xqx

Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow.

12%
Средний
больше 3 лет назад
github логотип
GHSA-qww5-w98g-66q7

Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.

7%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2014-1974

ELSA-2014-1974: rpm security update (IMPORTANT)

больше 10 лет назад
fstec логотип
BDU:2015-07494

Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 9.3
7%
Низкий
больше 10 лет назад

Уязвимостей на страницу