Redhat

Enterprise Linux Server Eus

622 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.47%
  • Published 27.07.2018 16:29:00
  • Last modified 21.11.2024 03:08:59

It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a gi...

  • EPSS 2.1%
  • Published 27.07.2018 12:29:00
  • Last modified 21.11.2024 03:08:56

A flaw was found in the way samba client before samba 4.4.16, samba 4.5.14 and samba 4.6.8 used encryption with the max protocol set as SMB3. The connection could lose the requirement for signing and encrypting to any DFS redirects, allowing an attac...

Exploit
  • EPSS 10.16%
  • Published 26.07.2018 19:29:00
  • Last modified 21.11.2024 03:19:53

The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn't properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID...

  • EPSS 3.89%
  • Published 17.07.2018 17:29:00
  • Last modified 21.11.2024 03:48:53

An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscripti...

  • EPSS 3.31%
  • Published 17.07.2018 17:29:00
  • Last modified 21.11.2024 03:48:54

An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.

  • EPSS 4.42%
  • Published 17.07.2018 17:29:00
  • Last modified 21.11.2024 03:48:55

An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a '/' character.

  • EPSS 0.92%
  • Published 10.07.2018 21:29:01
  • Last modified 21.11.2024 04:05:53

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.

  • EPSS 0.39%
  • Published 03.07.2018 01:29:00
  • Last modified 21.11.2024 03:23:50

Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to...

  • EPSS 2.05%
  • Published 13.06.2018 20:29:00
  • Last modified 21.11.2024 03:42:08

389-ds-base before versions 1.4.0.10, 1.3.8.3 is vulnerable to a race condition in the way 389-ds-base handles persistent search, resulting in a crash if the server is under load. An anonymous attacker could use this flaw to trigger a denial of servi...

  • EPSS 18.92%
  • Published 11.06.2018 21:29:16
  • Last modified 21.11.2024 04:08:16

A buffer overflow was found during UTF8 to Unicode string conversion within JavaScript with extremely large amounts of data. This vulnerability requires the use of a malicious or vulnerable legacy extension in order to occur. This vulnerability affec...