Логотип exploitDog
bind:"CVE-2013-7423" OR bind:"CVE-2015-1472" OR bind:"CVE-2015-1781" OR bind:"CVE-2015-1473"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2013-7423" OR bind:"CVE-2015-1472" OR bind:"CVE-2015-1781" OR bind:"CVE-2015-1473"

Количество 31

Количество 31

oracle-oval логотип

ELSA-2015-2199

больше 9 лет назад

ELSA-2015-2199: glibc security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2015-0863

около 10 лет назад

ELSA-2015-0863: glibc security and bug fix update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0526-1

больше 10 лет назад

Security update for glibc

EPSS: Низкий
ubuntu логотип

CVE-2013-7423

больше 10 лет назад

The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.

CVSS2: 5
EPSS: Низкий
redhat логотип

CVE-2013-7423

почти 12 лет назад

The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.

CVSS2: 1.2
EPSS: Низкий
nvd логотип

CVE-2013-7423

больше 10 лет назад

The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2013-7423

больше 10 лет назад

The send_dg function in resolv/res_send.c in GNU C Library (aka glibc ...

CVSS2: 5
EPSS: Низкий
github логотип

GHSA-7q6m-8g97-jq6m

около 3 лет назад

The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0439-1

почти 11 лет назад

Security update for glibc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0253-1

почти 11 лет назад

Security update for glibc

EPSS: Низкий
suse-cvrf логотип

SUSE-RU-2015:0794-1

почти 11 лет назад

Security update for glibc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0551-1

почти 12 лет назад

Security update for glibc

EPSS: Низкий
ubuntu логотип

CVE-2015-1472

около 10 лет назад

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.

CVSS2: 7.5
EPSS: Низкий
redhat логотип

CVE-2015-1472

больше 11 лет назад

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.

CVSS2: 2.6
EPSS: Низкий
nvd логотип

CVE-2015-1472

около 10 лет назад

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.

CVSS2: 7.5
EPSS: Низкий
debian логотип

CVE-2015-1472

около 10 лет назад

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka gli ...

CVSS2: 7.5
EPSS: Низкий
github логотип

GHSA-7g3j-xr9q-w6cw

около 3 лет назад

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.

EPSS: Низкий
ubuntu логотип

CVE-2015-1473

около 10 лет назад

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers to cause a denial of service (segmentation violation) or overwrite memory locations beyond the stack boundary via a long line containing wide characters that are improperly handled in a wscanf call.

CVSS2: 6.4
EPSS: Низкий
redhat логотип

CVE-2015-1473

больше 11 лет назад

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers to cause a denial of service (segmentation violation) or overwrite memory locations beyond the stack boundary via a long line containing wide characters that are improperly handled in a wscanf call.

CVSS2: 2.6
EPSS: Низкий
nvd логотип

CVE-2015-1473

около 10 лет назад

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers to cause a denial of service (segmentation violation) or overwrite memory locations beyond the stack boundary via a long line containing wide characters that are improperly handled in a wscanf call.

CVSS2: 6.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2015-2199

ELSA-2015-2199: glibc security, bug fix, and enhancement update (MODERATE)

больше 9 лет назад
oracle-oval логотип
ELSA-2015-0863

ELSA-2015-0863: glibc security and bug fix update (MODERATE)

около 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:0526-1

Security update for glibc

больше 10 лет назад
ubuntu логотип
CVE-2013-7423

The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.

CVSS2: 5
4%
Низкий
больше 10 лет назад
redhat логотип
CVE-2013-7423

The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.

CVSS2: 1.2
4%
Низкий
почти 12 лет назад
nvd логотип
CVE-2013-7423

The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.

CVSS2: 5
4%
Низкий
больше 10 лет назад
debian логотип
CVE-2013-7423

The send_dg function in resolv/res_send.c in GNU C Library (aka glibc ...

CVSS2: 5
4%
Низкий
больше 10 лет назад
github логотип
GHSA-7q6m-8g97-jq6m

The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.

4%
Низкий
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2015:0439-1

Security update for glibc

почти 11 лет назад
suse-cvrf логотип
SUSE-SU-2015:0253-1

Security update for glibc

почти 11 лет назад
suse-cvrf логотип
SUSE-RU-2015:0794-1

Security update for glibc

почти 11 лет назад
suse-cvrf логотип
SUSE-SU-2015:0551-1

Security update for glibc

почти 12 лет назад
ubuntu логотип
CVE-2015-1472

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.

CVSS2: 7.5
3%
Низкий
около 10 лет назад
redhat логотип
CVE-2015-1472

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.

CVSS2: 2.6
3%
Низкий
больше 11 лет назад
nvd логотип
CVE-2015-1472

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.

CVSS2: 7.5
3%
Низкий
около 10 лет назад
debian логотип
CVE-2015-1472

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka gli ...

CVSS2: 7.5
3%
Низкий
около 10 лет назад
github логотип
GHSA-7g3j-xr9q-w6cw

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.

3%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2015-1473

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers to cause a denial of service (segmentation violation) or overwrite memory locations beyond the stack boundary via a long line containing wide characters that are improperly handled in a wscanf call.

CVSS2: 6.4
0%
Низкий
около 10 лет назад
redhat логотип
CVE-2015-1473

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers to cause a denial of service (segmentation violation) or overwrite memory locations beyond the stack boundary via a long line containing wide characters that are improperly handled in a wscanf call.

CVSS2: 2.6
0%
Низкий
больше 11 лет назад
nvd логотип
CVE-2015-1473

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers to cause a denial of service (segmentation violation) or overwrite memory locations beyond the stack boundary via a long line containing wide characters that are improperly handled in a wscanf call.

CVSS2: 6.4
0%
Низкий
около 10 лет назад

Уязвимостей на страницу