Redhat

Enterprise Linux

1714 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 19.02.2025 18:15:23
  • Zuletzt bearbeitet 11.11.2025 17:15:37

A flaw was found in grub2. The calculation of the translation buffer when reading a language .mo file in grub_gettext_getstr_from_position() may overflow, leading to a Out-of-bound write. This issue can be leveraged by an attacker to overwrite grub2'...

Medienbericht
  • EPSS 63.39%
  • Veröffentlicht 18.02.2025 19:15:29
  • Zuletzt bearbeitet 03.11.2025 22:18:41

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in spec...

Exploit
  • EPSS 5.07%
  • Veröffentlicht 15.01.2025 15:15:10
  • Zuletzt bearbeitet 03.11.2025 22:16:38

A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write...

Exploit
  • EPSS 13.04%
  • Veröffentlicht 14.01.2025 18:15:25
  • Zuletzt bearbeitet 20.11.2025 21:15:59

A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of un...

Exploit
  • EPSS 0.47%
  • Veröffentlicht 14.01.2025 18:15:25
  • Zuletzt bearbeitet 03.11.2025 22:16:39

A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send chec...

Medienbericht Exploit
  • EPSS 2.98%
  • Veröffentlicht 14.01.2025 18:15:25
  • Zuletzt bearbeitet 03.11.2025 22:16:39

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using...

  • EPSS 2.53%
  • Veröffentlicht 14.01.2025 18:15:25
  • Zuletzt bearbeitet 03.11.2025 22:16:39

A flaw was found in rsync. When using the `--safe-links` option, the rsync client fails to properly verify if a symbolic link destination sent from the server contains another symbolic link within it. This results in a path traversal vulnerability, w...

  • EPSS 0.07%
  • Veröffentlicht 12.11.2024 03:15:03
  • Zuletzt bearbeitet 14.11.2024 13:38:04

In mutt and neomutt the In-Reply-To email header field is not protected by cryptographic signing which allows an attacker to reuse an unencrypted but signed email message to impersonate the original sender.

  • EPSS 0.07%
  • Veröffentlicht 12.11.2024 03:15:03
  • Zuletzt bearbeitet 14.11.2024 13:33:35

In mutt and neomutt, PGP encryption does not use the --hidden-recipient mode which may leak the Bcc email header field by inferring from the recipients info.

  • EPSS 0.07%
  • Veröffentlicht 12.11.2024 02:15:18
  • Zuletzt bearbeitet 16.07.2025 12:15:22

In neomutt and mutt, the To and Cc email headers are not validated by cryptographic signing which allows an attacker that intercepts a message to change their value and include himself as a one of the recipients to compromise message confidentiality.