Redhat

Enterprise Linux Desktop

1928 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.92%
  • Published 10.07.2018 21:29:01
  • Last modified 21.11.2024 04:05:53

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.

  • EPSS 0.08%
  • Published 10.07.2018 19:29:00
  • Last modified 21.11.2024 03:42:11

A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, processor does not deliver interrupts and exceptions, they are delivered on...

  • EPSS 0.58%
  • Published 10.07.2018 14:29:00
  • Last modified 21.11.2024 03:42:09

A flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having read access to ceph can delete, create ceph storage pools and corrupt snapshot images. Ceph branches master, mimic, luminous and jewel are believed to be a...

  • EPSS 1.27%
  • Published 10.07.2018 14:29:00
  • Last modified 21.11.2024 03:59:14

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authen...

  • EPSS 0.39%
  • Published 10.07.2018 14:29:00
  • Last modified 21.11.2024 03:59:15

A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Cep...

  • EPSS 1.11%
  • Published 09.07.2018 19:29:03
  • Last modified 21.11.2024 04:07:53

Adobe Flash Player versions 29.0.0.171 and earlier have an Integer Overflow vulnerability. Successful exploitation could lead to information disclosure.

  • EPSS 1.03%
  • Published 09.07.2018 19:29:03
  • Last modified 21.11.2024 04:07:53

Adobe Flash Player versions 29.0.0.171 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.

Warning
  • EPSS 37.38%
  • Published 09.07.2018 19:29:03
  • Last modified 13.02.2025 17:26:55

Adobe Flash Player versions 29.0.0.171 and earlier have a Stack-based buffer overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.

  • EPSS 3.17%
  • Published 09.07.2018 19:29:00
  • Last modified 21.11.2024 04:07:45

Adobe Flash Player versions 29.0.0.171 and earlier have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.

  • EPSS 2.92%
  • Published 09.07.2018 13:29:00
  • Last modified 21.11.2024 03:47:58

In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.