Redhat

Enterprise Linux Workstation

1845 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Warning Exploit
  • EPSS 93.27%
  • Published 08.07.2015 14:59:05
  • Last modified 21.04.2025 15:09:01

Use-after-free vulnerability in the ByteArray class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.296 and 14.x through 18.0.0.194 on Windows and OS X and 11.x through 11.2.202.468 on Linux allows remote attacker...

  • EPSS 0.09%
  • Published 06.07.2015 15:59:06
  • Last modified 12.04.2025 10:46:40

The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of pre...

  • EPSS 2.5%
  • Published 02.07.2015 21:59:00
  • Last modified 12.04.2025 10:46:40

Unspecified vulnerability in IBM Java 8 before SR1, 7 R1 before SR2 FP11, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allows remote attackers to gain privileges via unknown vectors related to the Java Virtual Machin...

Warning
  • EPSS 92.91%
  • Published 23.06.2015 21:59:01
  • Last modified 12.04.2025 10:46:40

Heap-based buffer overflow in Adobe Flash Player before 13.0.0.296 and 14.x through 18.x before 18.0.0.194 on Windows and OS X and before 11.2.202.468 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in...

  • EPSS 7.07%
  • Published 15.06.2015 15:59:06
  • Last modified 12.04.2025 10:46:40

Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which ...

  • EPSS 5.35%
  • Published 15.06.2015 15:59:00
  • Last modified 12.04.2025 10:46:40

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

Exploit
  • EPSS 16.94%
  • Published 09.06.2015 18:59:10
  • Last modified 12.04.2025 10:46:40

The do_soap_call function in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that the uri property is a string, which allows remote attackers to obtain sensitive information by providing crafted seria...

Exploit
  • EPSS 50.79%
  • Published 09.06.2015 18:59:09
  • Last modified 12.04.2025 10:46:40

The SoapClient::__call method in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that __default_headers is an array, which allows remote attackers to execute arbitrary code by providing crafted serial...

Exploit
  • EPSS 10.31%
  • Published 09.06.2015 18:59:08
  • Last modified 12.04.2025 10:46:40

The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files wi...

  • EPSS 6.08%
  • Published 09.06.2015 18:59:07
  • Last modified 12.04.2025 10:46:40

PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character in certain situations, which allows remote attackers to bypass intended extension restrictions and access files or directories with...