Redhat

Enterprise Linux Desktop

1928 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.14%
  • Published 05.10.2017 01:29:04
  • Last modified 20.04.2025 01:37:25

Mercurial prior to version 4.3 is vulnerable to a missing symlink check that can malicious repositories to modify files outside the repository

  • EPSS 2.4%
  • Published 05.10.2017 01:29:04
  • Last modified 20.04.2025 01:37:25

Mercurial prior to 4.3 did not adequately sanitize hostnames passed to ssh, leading to possible shell-injection attacks.

Warning Exploit
  • EPSS 94.37%
  • Published 04.10.2017 01:29:02
  • Last modified 20.04.2025 01:37:25

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload ...

Exploit
  • EPSS 60.19%
  • Published 04.10.2017 01:29:02
  • Last modified 20.04.2025 01:37:25

Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.

  • EPSS 92.64%
  • Published 03.10.2017 01:29:02
  • Last modified 20.04.2025 01:37:25

Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.

Exploit
  • EPSS 5.62%
  • Published 03.10.2017 01:29:02
  • Last modified 20.04.2025 01:37:25

Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.

  • EPSS 15.41%
  • Published 03.10.2017 01:29:02
  • Last modified 20.04.2025 01:37:25

dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.

  • EPSS 60.15%
  • Published 03.10.2017 01:29:02
  • Last modified 20.04.2025 01:37:25

Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.

  • EPSS 15.74%
  • Published 03.10.2017 01:29:02
  • Last modified 20.04.2025 01:37:25

Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.

  • EPSS 81.76%
  • Published 03.10.2017 01:29:01
  • Last modified 20.04.2025 01:37:25

In dnsmasq before 2.78, if the DNS packet size does not match the expected size, the size parameter in a memset call gets a negative value. As it is an unsigned value, memset ends up writing up to 0xffffffff zero's (0xffffffffffffffff in 64 bit platf...