Redhat

Enterprise Linux Server Tus

765 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.1%
  • Published 23.07.2019 23:15:39
  • Last modified 21.11.2024 04:41:29

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with net...

  • EPSS 1.33%
  • Published 23.07.2019 23:15:39
  • Last modified 21.11.2024 04:41:29

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with netwo...

  • EPSS 0.46%
  • Published 23.07.2019 23:15:38
  • Last modified 21.11.2024 04:41:27

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Compiling). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Difficult to exploit vulnerability allows low privileged...

  • EPSS 0.04%
  • Published 23.07.2019 23:15:38
  • Last modified 21.11.2024 04:41:27

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high p...

  • EPSS 0.51%
  • Published 23.07.2019 23:15:38
  • Last modified 21.11.2024 04:41:27

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: XML). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker...

  • EPSS 1.49%
  • Published 22.07.2019 15:15:10
  • Last modified 21.11.2024 04:52:40

The JPXStream::init function in Poppler 0.78.0 and earlier doesn't check for negative values of stream length, leading to an Integer Overflow, thereby making it possible to allocate a large memory chunk on the heap, with a size controlled by an attac...

Exploit
  • EPSS 5.39%
  • Published 19.07.2019 17:15:11
  • Last modified 21.11.2024 04:18:04

Gnome Pango 1.42 and later is affected by: Buffer Overflow. The impact is: The heap based buffer overflow can be used to get code execution. The component is: function name: pango_log2vis_get_embedding_levels, assignment of nchars and the loop condit...

Exploit
  • EPSS 6.76%
  • Published 16.07.2019 17:15:12
  • Last modified 21.11.2024 04:25:22

SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in BlitNtoN in video/SDL_blit_N.c when called from SDL_SoftBlit in video/SDL_blit.c.

  • EPSS 15.91%
  • Published 11.07.2019 19:15:13
  • Last modified 21.11.2024 04:23:02

An issue was discovered in Squid 4.0.23 through 4.7. When checking Basic Authentication with HttpHeader::getAuth, Squid uses a global buffer to store the decoded data. Squid does not check that the decoded length isn't greater than the buffer, leadin...

  • EPSS 22.48%
  • Published 11.07.2019 19:15:12
  • Last modified 21.11.2024 04:18:37

A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis...