Логотип exploitDog
bind:CVE-2016-5328
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-5328

Количество 2

Количество 2

nvd логотип

CVE-2016-5328

около 9 лет назад

VMware Tools 9.x and 10.x before 10.1.0 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-4h47-vq45-ccw2

больше 3 лет назад

VMware Tools 9.x and 10.x before 10.1.0 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.

CVSS3: 5.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2016-5328

VMware Tools 9.x and 10.x before 10.1.0 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.

CVSS3: 5.5
0%
Низкий
около 9 лет назад
github логотип
GHSA-4h47-vq45-ccw2

VMware Tools 9.x and 10.x before 10.1.0 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.

CVSS3: 5.5
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу