Redhat

Enterprise Linux Workstation

1845 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 5.62%
  • Published 03.10.2017 01:29:02
  • Last modified 20.04.2025 01:37:25

Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.

  • EPSS 15.41%
  • Published 03.10.2017 01:29:02
  • Last modified 20.04.2025 01:37:25

dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.

  • EPSS 60.15%
  • Published 03.10.2017 01:29:02
  • Last modified 20.04.2025 01:37:25

Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.

  • EPSS 15.74%
  • Published 03.10.2017 01:29:02
  • Last modified 20.04.2025 01:37:25

Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.

  • EPSS 81.76%
  • Published 03.10.2017 01:29:01
  • Last modified 20.04.2025 01:37:25

In dnsmasq before 2.78, if the DNS packet size does not match the expected size, the size parameter in a memset call gets a negative value. As it is an unsigned value, memset ends up writing up to 0xffffffff zero's (0xffffffffffffffff in 64 bit platf...

  • EPSS 0.07%
  • Published 19.09.2017 16:29:00
  • Last modified 20.04.2025 01:37:25

The Linux kernel, as used in Red Hat Enterprise Linux 7, kernel-rt, and Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended securelevel/secureboot restrictions by leveraging improper handling of secur...

Warning Exploit
  • EPSS 94.36%
  • Published 19.09.2017 13:29:00
  • Last modified 20.04.2025 01:37:25

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP...

Exploit
  • EPSS 4.19%
  • Published 12.09.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remot...

Exploit
  • EPSS 79.83%
  • Published 05.09.2017 06:29:00
  • Last modified 20.04.2025 01:37:25

backend/comics/comics-document.c (aka the comic book backend) in GNOME Evince before 3.24.1 allows remote attackers to execute arbitrary commands via a .cbt file that is a TAR archive containing a filename beginning with a "--" command-line option su...

Exploit
  • EPSS 9.67%
  • Published 31.08.2017 20:29:00
  • Last modified 20.04.2025 01:37:25

RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications that include terminal escape characters. Printing the gem specification would execute terminal escape sequences.