Redhat

Enterprise Linux Server

1890 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.19%
  • Veröffentlicht 15.10.2018 16:29:03
  • Zuletzt bearbeitet 21.11.2024 03:55:26

Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.

Exploit
  • EPSS 16.86%
  • Veröffentlicht 15.10.2018 16:29:02
  • Zuletzt bearbeitet 21.11.2024 03:55:17

Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving errorhandler setup. NOTE: this issue exists because of an incomplete fix for CVE-2018-17183.

Exploit
  • EPSS 0.09%
  • Veröffentlicht 15.10.2018 02:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:40

An invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl in elfutils through v0.174. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated b...

Exploit
  • EPSS 58.11%
  • Veröffentlicht 09.10.2018 17:29:01
  • Zuletzt bearbeitet 21.11.2024 03:49:30

It was found that ceph-isci-cli package as shipped by Red Hat Ceph Storage 2 and 3 is using python-werkzeug in debug shell mode. This is done by setting debug=True in file /usr/bin/rbd-target-api provided by ceph-isci-cli package. This allows unauthe...

Exploit
  • EPSS 0.18%
  • Veröffentlicht 09.10.2018 17:29:01
  • Zuletzt bearbeitet 21.11.2024 03:55:26

The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.

  • EPSS 0.42%
  • Veröffentlicht 08.10.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:40:23

Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect Access Control vulnerability in SSH server that can result in RCE. This attack appear to be exploitable via network connectivity.

  • EPSS 4.51%
  • Veröffentlicht 08.10.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:40:23

Python Cryptographic Authority pyopenssl version prior to version 17.5.0 contains a CWE-416: Use After Free vulnerability in X509 object handling that can result in Use after free can lead to possible denial of service or remote code execution.. This...

  • EPSS 0.16%
  • Veröffentlicht 08.10.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:40:23

Python Cryptographic Authority pyopenssl version Before 17.5.0 contains a CWE - 401 : Failure to Release Memory Before Removing Last Reference vulnerability in PKCS #12 Store that can result in Denial of service if memory runs low or is exhausted. Th...

Exploit
  • EPSS 70.7%
  • Veröffentlicht 06.10.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:54:27

Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has ...

  • EPSS 82.62%
  • Veröffentlicht 04.10.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:01

When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause...