Redhat

Enterprise Linux Server

1890 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 7.07%
  • Veröffentlicht 15.06.2015 15:59:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which ...

  • EPSS 5.35%
  • Veröffentlicht 15.06.2015 15:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

Exploit
  • EPSS 16.94%
  • Veröffentlicht 09.06.2015 18:59:10
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The do_soap_call function in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that the uri property is a string, which allows remote attackers to obtain sensitive information by providing crafted seria...

Exploit
  • EPSS 50.79%
  • Veröffentlicht 09.06.2015 18:59:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The SoapClient::__call method in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that __default_headers is an array, which allows remote attackers to execute arbitrary code by providing crafted serial...

Exploit
  • EPSS 10.31%
  • Veröffentlicht 09.06.2015 18:59:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files wi...

  • EPSS 6.08%
  • Veröffentlicht 09.06.2015 18:59:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character in certain situations, which allows remote attackers to bypass intended extension restrictions and access files or directories with...

Exploit
  • EPSS 75.52%
  • Veröffentlicht 09.06.2015 18:59:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc1867.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote attackers to cause a denial of service (CPU consumption) via crafted form ...

Exploit
  • EPSS 20.64%
  • Veröffentlicht 09.06.2015 18:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer ove...

Exploit
  • EPSS 42.03%
  • Veröffentlicht 09.06.2015 18:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The phar_parse_tarfile function in ext/phar/tar.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 does not verify that the first character of a filename is different from the \0 character, which allows remote attackers to cause a de...

Exploit
  • EPSS 38.96%
  • Veröffentlicht 09.06.2015 18:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The php_handler function in sapi/apache2handler/sapi_apache2.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, when the Apache HTTP Server 2.4.x is used, allows remote attackers to cause a denial of service (application crash) or p...