Redhat

Enterprise Linux Server Tus

765 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.19%
  • Veröffentlicht 19.04.2018 02:29:01
  • Zuletzt bearbeitet 21.11.2024 04:04:22

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticat...

  • EPSS 0.25%
  • Veröffentlicht 19.04.2018 02:29:01
  • Zuletzt bearbeitet 21.11.2024 04:04:23

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated a...

  • EPSS 0.65%
  • Veröffentlicht 18.04.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:40:59

The set_text_distance function in devices/vector/gdevpdts.c in the pdfwrite component in Artifex Ghostscript through 9.22 does not prevent overflows in text-positioning calculation, which allows remote attackers to cause a denial of service (applicat...

  • EPSS 35.17%
  • Veröffentlicht 06.04.2018 13:29:00
  • Zuletzt bearbeitet 14.04.2025 20:15:16

GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via th...

  • EPSS 0.13%
  • Veröffentlicht 30.03.2018 21:29:02
  • Zuletzt bearbeitet 21.11.2024 04:12:22

The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.

  • EPSS 9.08%
  • Veröffentlicht 26.03.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:36

In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication con...

Exploit
  • EPSS 42.51%
  • Veröffentlicht 23.03.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:39:46

rsyslog librelp version 1.2.14 and earlier contains a Buffer Overflow vulnerability in the checking of x509 certificates from a peer that can result in Remote code execution. This attack appear to be exploitable a remote attacker that can connect to ...

  • EPSS 0.84%
  • Veröffentlicht 20.03.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 04:13:14

org.slf4j.ext.EventData in the slf4j-ext module in QOS.CH SLF4J before 1.8.0-beta2 allows remote attackers to bypass intended access restrictions via crafted data. EventData in the slf4j-ext module in QOS.CH SLF4J, has been fixed in SLF4J versions 1....

  • EPSS 0.04%
  • Veröffentlicht 16.03.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:06

A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.

Exploit
  • EPSS 16.05%
  • Veröffentlicht 13.03.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:39

transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is co...