Redhat

Enterprise Linux Server Eus

622 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.61%
  • Veröffentlicht 11.12.2018 16:29:01
  • Zuletzt bearbeitet 21.11.2024 03:55:46

An integer overflow in path handling lead to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

  • EPSS 0.47%
  • Veröffentlicht 06.12.2018 14:29:01
  • Zuletzt bearbeitet 21.11.2024 04:15:43

In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Androi...

  • EPSS 0.08%
  • Veröffentlicht 03.12.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:28

It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript d...

Exploit
  • EPSS 19.56%
  • Veröffentlicht 29.11.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:14:18

FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution.

  • EPSS 0.04%
  • Veröffentlicht 26.11.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:29

The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL pointer dereference bug in the __netlink_ns_capable() function in the net/netlink/af_netlink.c file. A local attacker could exploit this when a net namespace with a netnsid is assi...

Exploit
  • EPSS 66.26%
  • Veröffentlicht 23.11.2018 05:29:03
  • Zuletzt bearbeitet 21.11.2024 03:57:59

psi/zdevice2.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because available stack space is not checked when the device remains the same.

Exploit
  • EPSS 0.72%
  • Veröffentlicht 23.11.2018 05:29:03
  • Zuletzt bearbeitet 21.11.2024 03:57:59

psi/zicc.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because of a setcolorspace type confusion.

Exploit
  • EPSS 0.72%
  • Veröffentlicht 23.11.2018 05:29:03
  • Zuletzt bearbeitet 21.11.2024 03:57:59

psi/zfjbig2.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because of a JBIG2Decode type confusion.

  • EPSS 10.2%
  • Veröffentlicht 21.11.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:57:52

An issue was discovered in Artifex Ghostscript before 9.26. LockSafetyParams is not checked correctly if another device is used.

Exploit
  • EPSS 0.64%
  • Veröffentlicht 15.11.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:45

Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.