Логотип exploitDog
bind:CVE-2018-1000156
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-1000156

Количество 12

Количество 12

ubuntu логотип

CVE-2018-1000156

больше 7 лет назад

GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.

CVSS3: 7.8
EPSS: Средний
redhat логотип

CVE-2018-1000156

больше 7 лет назад

GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.

CVSS3: 7.8
EPSS: Средний
nvd логотип

CVE-2018-1000156

больше 7 лет назад

GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.

CVSS3: 7.8
EPSS: Средний
msrc логотип

CVE-2018-1000156

почти 5 лет назад

CVSS3: 7.8
EPSS: Средний
debian логотип

CVE-2018-1000156

больше 7 лет назад

GNU Patch version 2.7.6 contains an input validation vulnerability whe ...

CVSS3: 7.8
EPSS: Средний
github логотип

GHSA-r9rq-mhxg-686q

около 3 лет назад

GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.

CVSS3: 7.8
EPSS: Средний
oracle-oval логотип

ELSA-2018-1200

около 7 лет назад

ELSA-2018-1200: patch security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2018-1199

около 7 лет назад

ELSA-2018-1199: patch security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2018-01502

больше 7 лет назад

Уязвимость программной Unix-утилиты GNU Patch, связанная с недостаточной проверкой входных данных, позволяющая нарушителю вызвать отказ в обслуживании, получить доступ к конфиденциальным данным или нарушить их целостность

CVSS3: 7.8
EPSS: Средний
suse-cvrf логотип

openSUSE-SU-2018:1137-1

около 7 лет назад

Security update for patch

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1128-1

около 7 лет назад

Security update for patch

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1162-1

около 7 лет назад

Security update for patch

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-1000156

GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.

CVSS3: 7.8
43%
Средний
больше 7 лет назад
redhat логотип
CVE-2018-1000156

GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.

CVSS3: 7.8
43%
Средний
больше 7 лет назад
nvd логотип
CVE-2018-1000156

GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.

CVSS3: 7.8
43%
Средний
больше 7 лет назад
msrc логотип
CVSS3: 7.8
43%
Средний
почти 5 лет назад
debian логотип
CVE-2018-1000156

GNU Patch version 2.7.6 contains an input validation vulnerability whe ...

CVSS3: 7.8
43%
Средний
больше 7 лет назад
github логотип
GHSA-r9rq-mhxg-686q

GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.

CVSS3: 7.8
43%
Средний
около 3 лет назад
oracle-oval логотип
ELSA-2018-1200

ELSA-2018-1200: patch security update (IMPORTANT)

около 7 лет назад
oracle-oval логотип
ELSA-2018-1199

ELSA-2018-1199: patch security update (IMPORTANT)

около 7 лет назад
fstec логотип
BDU:2018-01502

Уязвимость программной Unix-утилиты GNU Patch, связанная с недостаточной проверкой входных данных, позволяющая нарушителю вызвать отказ в обслуживании, получить доступ к конфиденциальным данным или нарушить их целостность

CVSS3: 7.8
43%
Средний
больше 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:1137-1

Security update for patch

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1128-1

Security update for patch

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1162-1

Security update for patch

около 7 лет назад

Уязвимостей на страницу