This page was not yet optimized for use on mobile devices.
CVE-2015-8779
Data ?
Vulnerability ID | CVE-2015-8779 |
---|---|
Published on | 19.04.2016 21:59 |
Severity | CRITICAL |
Vulnerable configurations ?
-
cpe:2.3:a:gnu:glibc:-:*:*:*:*:*:*:*,
cpe:2.3:a:gnu:glibc:-:*:*:*:*:*:x64:*,
cpe:2.3:a:gnu:glibc:0.1:*:*:*:*:*:*:*,
cpe:2.3:a:gnu:glibc:0.4:*:*:*:*:*:*:*,
cpe:2.3:a:gnu:glibc:0.4.1:*:*:*:*:*:*:*,
cpe:2.3:a:gnu:glibc:0.5:*:*:*:*:*:*:*,
cpe:2.3:a:gnu:glibc:0.6:*:*:*:*:*:*:*,
cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*,
cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*,
cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*,
…
Vulnerable certificates ?
The CVE was matched to the following certificates. This means the vulnerability likely affects said certified devices. However, this is an automated process that may have false positives and negatives.