Redhat

Enterprise Linux

1715 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.76%
  • Veröffentlicht 18.10.2018 13:29:04
  • Zuletzt bearbeitet 21.11.2024 03:45:05

Plaintext of decrypted emails can leak through by user submitting an embedded form by pressing enter key within a text input field. This vulnerability affects Thunderbird < 52.9.

  • EPSS 0.79%
  • Veröffentlicht 18.10.2018 13:29:03
  • Zuletzt bearbeitet 21.11.2024 03:45:04

Decrypted S/MIME parts, when included in HTML crafted for an attack, can leak plaintext when included in a a HTML reply/forward. This vulnerability affects Thunderbird < 52.9.

Exploit
  • EPSS 78.33%
  • Veröffentlicht 17.10.2018 12:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:20

A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.

Exploit
  • EPSS 66.23%
  • Veröffentlicht 06.10.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:54:27

Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has ...

  • EPSS 10.17%
  • Veröffentlicht 28.09.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:30

A flaw was found in 389 Directory Server. A specially crafted search query could lead to excessive CPU consumption in the do_search() function. An unauthenticated attacker could use this flaw to provoke a denial of service.

  • EPSS 17.4%
  • Veröffentlicht 25.09.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:43:58

In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitiga...

  • EPSS 0.23%
  • Veröffentlicht 21.09.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:29

A flaw was discovered in the HPACK decoder of HAProxy, before 1.8.14, that is used for HTTP/2. An out-of-bounds read access in hpack_valid_idx() resulted in a remote crash and denial of service.

  • EPSS 0.33%
  • Veröffentlicht 10.09.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 02:57:22

A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.

  • EPSS 0.37%
  • Veröffentlicht 05.09.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:26

curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocat...

  • EPSS 0.28%
  • Veröffentlicht 05.09.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:52:56

In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact.