Логотип exploitDog
bind:CVE-2025-5278
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-5278

Количество 5

Количество 5

ubuntu логотип

CVE-2025-5278

23 дня назад

A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.

CVSS3: 4.4
EPSS: Низкий
redhat логотип

CVE-2025-5278

24 дня назад

A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.

CVSS3: 4.4
EPSS: Низкий
nvd логотип

CVE-2025-5278

23 дня назад

A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.

CVSS3: 4.4
EPSS: Низкий
debian логотип

CVE-2025-5278

23 дня назад

A flaw was found in GNU Coreutils. The sort utility's begfield() funct ...

CVSS3: 4.4
EPSS: Низкий
github логотип

GHSA-ch64-4x3c-w3jq

23 дня назад

A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.

CVSS3: 4.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-5278

A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.

CVSS3: 4.4
0%
Низкий
23 дня назад
redhat логотип
CVE-2025-5278

A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.

CVSS3: 4.4
0%
Низкий
24 дня назад
nvd логотип
CVE-2025-5278

A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.

CVSS3: 4.4
0%
Низкий
23 дня назад
debian логотип
CVE-2025-5278

A flaw was found in GNU Coreutils. The sort utility's begfield() funct ...

CVSS3: 4.4
0%
Низкий
23 дня назад
github логотип
GHSA-ch64-4x3c-w3jq

A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.

CVSS3: 4.4
0%
Низкий
23 дня назад

Уязвимостей на страницу