Redhat

Enterprise Linux Server Aus

1059 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.06%
  • Veröffentlicht 14.09.2017 06:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The DECnet parser in tcpdump before 4.9.2 has a buffer over-read in print-decnet.c:decnet_print().

  • EPSS 2.06%
  • Veröffentlicht 14.09.2017 06:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The Zephyr parser in tcpdump before 4.9.2 has a buffer over-read in print-zephyr.c, several functions.

  • EPSS 2.06%
  • Veröffentlicht 14.09.2017 06:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The IEEE 802.11 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_11.c:parse_elements().

Exploit
  • EPSS 3.03%
  • Veröffentlicht 12.09.2017 17:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remot...

Exploit
  • EPSS 76.67%
  • Veröffentlicht 05.09.2017 06:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

backend/comics/comics-document.c (aka the comic book backend) in GNOME Evince before 3.24.1 allows remote attackers to execute arbitrary commands via a .cbt file that is a TAR archive containing a filename beginning with a "--" command-line option su...

Exploit
  • EPSS 7.36%
  • Veröffentlicht 31.08.2017 20:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications that include terminal escape characters. Printing the gem specification would execute terminal escape sequences.

Exploit
  • EPSS 11.23%
  • Veröffentlicht 31.08.2017 20:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications to cause a denial of service attack against RubyGems clients who have issued a `query` command.

Exploit
  • EPSS 18.56%
  • Veröffentlicht 31.08.2017 20:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

RubyGems version 2.6.12 and earlier fails to validate specification names, allowing a maliciously crafted gem to potentially overwrite any file on the filesystem.

Exploit
  • EPSS 5.21%
  • Veröffentlicht 31.08.2017 20:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

RubyGems version 2.6.12 and earlier is vulnerable to a DNS hijacking vulnerability that allows a MITM attacker to force the RubyGems client to download and install gems from a server that the attacker controls.

Exploit
  • EPSS 1.48%
  • Veröffentlicht 31.08.2017 17:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a '\0' byte, returning...