Redhat

Enterprise Linux Server

1891 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 48.7%
  • Veröffentlicht 06.06.2017 21:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In Mercurial before 4.1.3, "hg serve --stdio" allows remote authenticated users to launch the Python debugger, and consequently execute arbitrary code, by using --debugger as a repository name.

Exploit
  • EPSS 38.97%
  • Veröffentlicht 29.05.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

servers/slapd/back-mdb/search.c in OpenLDAP through 2.4.44 is prone to a double free vulnerability. A user with access to search the directory can crash slapd by issuing a search including the Paged Results control with a page size of 0.

  • EPSS 13%
  • Veröffentlicht 23.05.2017 04:29:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.

  • EPSS 20.28%
  • Veröffentlicht 23.05.2017 04:29:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.

  • EPSS 12.09%
  • Veröffentlicht 23.05.2017 04:29:01
  • Zuletzt bearbeitet 04.12.2025 17:15:51

The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.

  • EPSS 6.98%
  • Veröffentlicht 23.05.2017 04:29:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.

Warnung Exploit
  • EPSS 92.86%
  • Veröffentlicht 27.04.2017 01:59:02
  • Zuletzt bearbeitet 22.10.2025 00:16:11

Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in ...

  • EPSS 2.37%
  • Veröffentlicht 24.04.2017 23:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The xsltAddTextString function in transform.c in libxslt 1.1.29, as used in Blink in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android, lacked a check for integer overflow during a size calculation, which a...

Warnung Exploit
  • EPSS 57.2%
  • Veröffentlicht 24.04.2017 23:59:00
  • Zuletzt bearbeitet 22.10.2025 00:16:06

Incorrect handling of complex species in V8 in Google Chrome prior to 57.0.2987.98 for Linux, Windows, and Mac and 57.0.2987.108 for Android allowed a remote attacker to execute arbitrary code via a crafted HTML page.

  • EPSS 0.61%
  • Veröffentlicht 24.04.2017 23:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Blink in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android failed to correctly propagate CSP restrictions to local scheme pages, which allowed a remote attacker to bypass content security policy via a craft...