Логотип exploitDog
bind:CVE-2008-3687
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2008-3687

Количество 4

Количество 4

ubuntu логотип

CVE-2008-3687

больше 17 лет назад

Heap-based buffer overflow in the flask_security_label function in Xen 3.3, when compiled with the XSM:FLASK module, allows unprivileged domain users (domU) to execute arbitrary code via the flask_op hypercall.

CVSS2: 6.8
EPSS: Низкий
nvd логотип

CVE-2008-3687

больше 17 лет назад

Heap-based buffer overflow in the flask_security_label function in Xen 3.3, when compiled with the XSM:FLASK module, allows unprivileged domain users (domU) to execute arbitrary code via the flask_op hypercall.

CVSS2: 6.8
EPSS: Низкий
debian логотип

CVE-2008-3687

больше 17 лет назад

Heap-based buffer overflow in the flask_security_label function in Xen ...

CVSS2: 6.8
EPSS: Низкий
github логотип

GHSA-x34x-jj7g-95j8

почти 4 года назад

Heap-based buffer overflow in the flask_security_label function in Xen 3.3, when compiled with the XSM:FLASK module, allows unprivileged domain users (domU) to execute arbitrary code via the flask_op hypercall.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2008-3687

Heap-based buffer overflow in the flask_security_label function in Xen 3.3, when compiled with the XSM:FLASK module, allows unprivileged domain users (domU) to execute arbitrary code via the flask_op hypercall.

CVSS2: 6.8
2%
Низкий
больше 17 лет назад
nvd логотип
CVE-2008-3687

Heap-based buffer overflow in the flask_security_label function in Xen 3.3, when compiled with the XSM:FLASK module, allows unprivileged domain users (domU) to execute arbitrary code via the flask_op hypercall.

CVSS2: 6.8
2%
Низкий
больше 17 лет назад
debian логотип
CVE-2008-3687

Heap-based buffer overflow in the flask_security_label function in Xen ...

CVSS2: 6.8
2%
Низкий
больше 17 лет назад
github логотип
GHSA-x34x-jj7g-95j8

Heap-based buffer overflow in the flask_security_label function in Xen 3.3, when compiled with the XSM:FLASK module, allows unprivileged domain users (domU) to execute arbitrary code via the flask_op hypercall.

2%
Низкий
почти 4 года назад

Уязвимостей на страницу