Oracle

Linux

225 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 4.19%
  • Veröffentlicht 21.07.2016 10:12:16
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows remote attackers to affect confidentiality via vectors related...

  • EPSS 69.06%
  • Veröffentlicht 19.07.2016 02:00:20
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, wh...

  • EPSS 77.5%
  • Veröffentlicht 19.07.2016 02:00:19
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an app...

  • EPSS 87.62%
  • Veröffentlicht 19.07.2016 02:00:18
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The net/http package in Go through 1.6 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which mi...

  • EPSS 84.16%
  • Veröffentlicht 19.07.2016 02:00:17
  • Zuletzt bearbeitet 12.04.2025 10:46:40

PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attacker...

  • EPSS 0.92%
  • Veröffentlicht 03.07.2016 21:59:17
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by levera...

Exploit
  • EPSS 5.22%
  • Veröffentlicht 03.07.2016 21:59:16
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-contai...

  • EPSS 0.06%
  • Veröffentlicht 27.06.2016 10:59:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a craft...

  • EPSS 0.33%
  • Veröffentlicht 20.06.2016 01:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.

  • EPSS 29.84%
  • Veröffentlicht 20.06.2016 01:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveragi...