Redhat

Enterprise Linux Server Tus

766 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.03%
  • Veröffentlicht 11.06.2018 21:29:15
  • Zuletzt bearbeitet 25.11.2025 17:50:16

Sites can bypass security checks on permissions to install lightweight themes by manipulating the "baseURI" property of the theme element. This could allow a malicious site to install a theme without user interaction which could contain offensive or ...

  • EPSS 0.88%
  • Veröffentlicht 11.06.2018 21:29:15
  • Zuletzt bearbeitet 21.11.2024 04:08:15

It is possible to spoof the filename of an attachment and display an arbitrary attachment name. This could lead to a user opening a remote attachment which is a different file type than expected. This vulnerability affects Thunderbird ESR < 52.8 and ...

  • EPSS 4.12%
  • Veröffentlicht 11.06.2018 21:29:14
  • Zuletzt bearbeitet 25.11.2025 17:50:16

Memory safety bugs were reported in Firefox ESR 52.6. These bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 52.7 an...

  • EPSS 29.45%
  • Veröffentlicht 11.06.2018 21:29:14
  • Zuletzt bearbeitet 25.11.2025 17:50:16

An out of bounds memory write while processing Vorbis audio data was reported through the Pwn2Own contest. This vulnerability affects Firefox < 59.0.1, Firefox ESR < 52.7.2, and Thunderbird < 52.7.

  • EPSS 4.12%
  • Veröffentlicht 11.06.2018 21:29:14
  • Zuletzt bearbeitet 25.11.2025 17:50:16

Memory safety bugs were reported in Firefox 59, Firefox ESR 52.7, and Thunderbird 52.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This v...

  • EPSS 1.64%
  • Veröffentlicht 08.06.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:25

mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" optio...

  • EPSS 0.48%
  • Veröffentlicht 24.05.2018 13:29:01
  • Zuletzt bearbeitet 21.11.2024 03:39:55

The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptra...

Exploit
  • EPSS 0.49%
  • Veröffentlicht 23.05.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:14

procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.

Exploit
  • EPSS 39.09%
  • Veröffentlicht 22.05.2018 12:29:00
  • Zuletzt bearbeitet 21.11.2024 04:05:48

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access vi...

  • EPSS 0.04%
  • Veröffentlicht 15.05.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:09

kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS ...