Vulnérabilités

Aggrégat CVE / GHSA / KEV / OSV — filtrage par étiquette et catégorie.

Filtre actif : Étiquette : enterprise-linux Effacer
ID Titre
CVE-2026-31431 KEV [KEV] Vulnérabilité dans Linux redhat (CVE-2026-31431)
vulnérabilité dans Linux redhat (CVE-2026-31431). L'exploitation peut entraîner la prise de contrôle totale du système. Inscrit au CISA KEV — exploitation active confirmée.
CVE-2026-3832 Vulnérabilité dans gnu (CVE-2026-3832)
vulnérabilité dans gnu (CVE-2026-3832). Risque d'opérations non autorisées ou de divulgation.
CVE-2026-5201 Vulnérabilité dans dos (CVE-2026-5201)
vulnérabilité dans dos (CVE-2026-5201). Risque d'opérations non autorisées ou de divulgation.
CVE-2026-5119 Vulnérabilité dans gnome (CVE-2026-5119)
vulnérabilité dans gnome (CVE-2026-5119). Des informations confidentielles peuvent être exposées.
CVE-2026-5121 Vulnérabilité dans libarchive (CVE-2026-5121)
vulnérabilité dans libarchive (CVE-2026-5121). Des informations confidentielles peuvent être exposées.
CVE-2026-0966 Vulnérabilité dans dos (CVE-2026-0966)
vulnérabilité dans dos (CVE-2026-0966). Risque d'opérations non autorisées ou de divulgation.
CVE-2026-4775 Vulnérabilité dans dos (CVE-2026-4775)
vulnérabilité dans dos (CVE-2026-4775). L'exploitation peut entraîner la prise de contrôle totale du système.
CVE-2026-4424 Lecture hors limites dans libarchive (CVE-2026-4424)
vulnérabilité dans libarchive (CVE-2026-4424). Des informations confidentielles peuvent être exposées.
CVE-2026-4271 Use-After-Free dans dos (CVE-2026-4271)
vulnérabilité dans dos (CVE-2026-4271). Risque d'opérations non autorisées ou de divulgation.
CVE-2025-14512 Vulnérabilité dans dos (CVE-2025-14512)
vulnérabilité dans dos (CVE-2025-14512). Risque d'opérations non autorisées ou de divulgation.
CVE-2025-14087 Vulnérabilité dans dos (CVE-2025-14087)
vulnérabilité dans dos (CVE-2025-14087). L'exploitation peut entraîner la prise de contrôle totale du système.
CVE-2025-32988 Vulnérabilité dans dos (CVE-2025-32988)
vulnérabilité dans dos (CVE-2025-32988). Risque d'opérations non autorisées ou de divulgation.
CVE-2025-32989 Vulnérabilité dans gnu (CVE-2025-32989)
vulnérabilité dans gnu (CVE-2025-32989). Risque d'opérations non autorisées ou de divulgation.
CVE-2025-6021 Vulnérabilité dans dos (CVE-2025-6021)
vulnérabilité dans dos (CVE-2025-6021). Risque d'opérations non autorisées ou de divulgation.
CVE-2025-4598 Vulnérabilité dans systemd-project (CVE-2025-4598)
vulnérabilité dans systemd-project (CVE-2025-4598). Des informations confidentielles peuvent être exposées.
CVE-2025-26465 Vulnérabilité dans openbsd (CVE-2025-26465)
vulnérabilité dans openbsd (CVE-2025-26465). Des informations confidentielles peuvent être exposées.
CVE-2024-6387 Vulnérabilité dans sonicwall (CVE-2024-6387)
vulnérabilité dans sonicwall (CVE-2024-6387). L'exploitation peut entraîner la prise de contrôle totale du système.
CVE-2023-50781 Vulnérabilité dans redhat (CVE-2023-50781)
vulnérabilité dans redhat (CVE-2023-50781). Des informations confidentielles peuvent être exposées.
CVE-2023-52356 Vulnérabilité dans dos (CVE-2023-52356)
vulnérabilité dans dos (CVE-2023-52356). Risque d'opérations non autorisées ou de divulgation.
CVE-2023-48795 Vulnérabilité dans russh (CVE-2023-48795)
vulnérabilité dans russh (CVE-2023-48795). Les données peuvent être altérées par des attaquants. Atténuation : mise à jour vers `0.40.2` ou plus.
CVE-2023-4911 KEV [KEV] Vulnérabilité dans Gnu c (CVE-2023-4911)
vulnérabilité dans Gnu c (CVE-2023-4911). L'exploitation peut entraîner la prise de contrôle totale du système. Inscrit au CISA KEV — exploitation active confirmée.
CVE-2023-6121 Lecture hors limites dans redhat (CVE-2023-6121)
vulnérabilité dans redhat (CVE-2023-6121). Risque d'opérations non autorisées ou de divulgation.
CVE-2023-44487 KEV [KEV] Vulnérabilité dans Ietf golang.org/x/net (CVE-2023-44487)
vulnérabilité dans Ietf golang.org/x/net (CVE-2023-44487). Risque d'opérations non autorisées ou de divulgation. Exploitable via ``Channel``. Inscrit au CISA KEV — exploitation active confirmée. Atténuation : mise à jour vers `0.17.0` ou plus.
CVE-2023-4806 Use-After-Free dans gnu (CVE-2023-4806)
vulnérabilité dans gnu (CVE-2023-4806). Risque d'opérations non autorisées ou de divulgation.
CVE-2023-4527 Vulnérabilité dans gnu (CVE-2023-4527)
vulnérabilité dans gnu (CVE-2023-4527). Risque d'opérations non autorisées ou de divulgation.
CVE-2023-3019 Use-After-Free dans dos (CVE-2023-3019)
vulnérabilité dans dos (CVE-2023-3019). Risque d'opérations non autorisées ou de divulgation.
CVE-2023-1652 Use-After-Free dans c (CVE-2023-1652)
vulnérabilité dans c (CVE-2023-1652). Des informations confidentielles peuvent être exposées.
CVE-2017-15102 The tower_probe function in drivers/usb/misc/legousbtower.c in the Linux kernel before 4.8.1 allows local users (who are physically proximate for inserting a crafted USB device) to gain privileges by...
The tower_probe function in drivers/usb/misc/legousbtower.c in the Linux kernel before 4.8.1 allows local users (who are physically proximate for inserting a crafted USB device) to gain privileges by leveraging a write-what-where condition that occurs after a race condition and a NULL pointer derefe...
CVE-2016-8610 A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote...
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to...
CVE-2017-15087 It was discovered that the fix for CVE-2017-12163 was not properly shipped in erratum RHSA-2017:2858 for Red Hat Gluster Storage 3.3 for RHEL 6.
It was discovered that the fix for CVE-2017-12163 was not properly shipped in erratum RHSA-2017:2858 for Red Hat Gluster Storage 3.3 for RHEL 6.
CVE-2017-15086 It was discovered that the fix for CVE-2017-12151 was not properly shipped in erratum RHSA-2017:2858 for Red Hat Gluster Storage 3.3 for RHEL 6.
It was discovered that the fix for CVE-2017-12151 was not properly shipped in erratum RHSA-2017:2858 for Red Hat Gluster Storage 3.3 for RHEL 6.
CVE-2017-15085 It was discovered that the fix for CVE-2017-12150 was not properly shipped in erratum RHSA-2017:2858 for Red Hat Gluster Storage 3.3 for RHEL 6.
It was discovered that the fix for CVE-2017-12150 was not properly shipped in erratum RHSA-2017:2858 for Red Hat Gluster Storage 3.3 for RHEL 6.
CVE-2017-1000111 Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety...
Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The soluti...
CVE-2015-7837 The Linux kernel, as used in Red Hat Enterprise Linux 7, kernel-rt, and Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended securelevel/secureboot res...
The Linux kernel, as used in Red Hat Enterprise Linux 7, kernel-rt, and Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended securelevel/secureboot restrictions by leveraging improper handling of secure_boot flag across kexec reboot.
CVE-2015-7553 Race condition in the kernel in Red Hat Enterprise Linux 7, kernel-rt and Red Hat Enterprise MRG 2, when the nfnetlink_log module is loaded, allows local users to cause a denial of service (panic) by...
Race condition in the kernel in Red Hat Enterprise Linux 7, kernel-rt and Red Hat Enterprise MRG 2, when the nfnetlink_log module is loaded, allows local users to cause a denial of service (panic) by creating netlink sockets.
CVE-2017-10661 Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descripto...
Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing.
CVE-2017-3106 Adobe Flash Player versions 26.0.0.137 and earlier have an exploitable type confusion vulnerability when parsing SWF files. Successful exploitation could lead to arbitrary code execution.
Adobe Flash Player versions 26.0.0.137 and earlier have an exploitable type confusion vulnerability when parsing SWF files. Successful exploitation could lead to arbitrary code execution.
CVE-2017-3085 Adobe Flash Player versions 26.0.0.137 and earlier have a security bypass vulnerability that leads to information disclosure when performing URL redirect.
Adobe Flash Player versions 26.0.0.137 and earlier have a security bypass vulnerability that leads to information disclosure when performing URL redirect.
CVE-2014-0143 Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in...
Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_...
CVE-2017-10664 qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt.
qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt.
CVE-2016-8743 Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represe...
Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end a...
CVE-2015-4035 scripts/xzgrep.in in xzgrep 5.2.x before 5.2.0, before 5.0.0 does not properly process file names containing semicolons, which allows remote attackers to execute arbitrary code by having a user run xz...
scripts/xzgrep.in in xzgrep 5.2.x before 5.2.0, before 5.0.0 does not properly process file names containing semicolons, which allows remote attackers to execute arbitrary code by having a user run xzgrep on a crafted file name.
CVE-2017-7980 Heap-based buffer overflow in Cirrus CLGD 54xx VGA Emulator in Quick Emulator (Qemu) 2.8 and earlier allows local guest OS users to execute arbitrary code or cause a denial of service (crash) via vect...
Heap-based buffer overflow in Cirrus CLGD 54xx VGA Emulator in Quick Emulator (Qemu) 2.8 and earlier allows local guest OS users to execute arbitrary code or cause a denial of service (crash) via vectors related to a VNC client updating its display after a VGA operation.
CVE-2016-4984 /usr/libexec/openldap/generate-server-cert.sh in openldap-servers sets weak permissions for the TLS certificate, which allows local users to obtain the TLS certificate by leveraging a race condition b...
/usr/libexec/openldap/generate-server-cert.sh in openldap-servers sets weak permissions for the TLS certificate, which allows local users to obtain the TLS certificate by leveraging a race condition between the creation of the certificate, and the chmod to protect it.
CVE-2016-6312 The mod_dontdothat component of the mod_dav_svn Apache module in Subversion as packaged in Red Hat Enterprise Linux 5.11 does not properly detect recursion during entity expansion, which allows remote...
The mod_dontdothat component of the mod_dav_svn Apache module in Subversion as packaged in Red Hat Enterprise Linux 5.11 does not properly detect recursion during entity expansion, which allows remote authenticated users with access to the webdav repository to cause a denial of service (memory consu...
CVE-2017-9788 In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assig...
In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale v...
CVE-2015-1795 Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root.
Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root.
CVE-2017-9953 There is an invalid free in Image::printIFDStructure that leads to a Segmentation fault in Exiv2 0.26. A crafted input will lead to a remote denial of service attack.
There is an invalid free in Image::printIFDStructure that leads to a Segmentation fault in Exiv2 0.26. A crafted input will lead to a remote denial of service attack.
CVE-2017-3167 In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being...
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.
CVE-2017-1000366 glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note...
glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap...

🍪 À propos des cookies

Nous utilisons des cookies pour conserver votre session, mémoriser la langue et améliorer le service.

En savoir plus →