Vulnerabilities > Redhat > Enterprise Linux
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2025-03-03 | CVE-2024-45778 | Integer Overflow or Wraparound vulnerability in multiple products A stack overflow flaw was found when reading a BFS file system. | 5.5 |
2025-03-03 | CVE-2024-45782 | Classic Buffer Overflow vulnerability in multiple products A flaw was found in the HFS filesystem. | 7.8 |
2025-03-03 | CVE-2025-0678 | Out-of-bounds Write vulnerability in multiple products A flaw was found in grub2. | 7.8 |
2025-02-18 | CVE-2025-26465 | A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. | 6.8 |
2024-11-12 | CVE-2024-49394 | Improper Verification of Cryptographic Signature vulnerability in multiple products In mutt and neomutt the In-Reply-To email header field is not protected by cryptographic signing which allows an attacker to reuse an unencrypted but signed email message to impersonate the original sender. | 5.3 |
2024-11-12 | CVE-2024-49395 | In mutt and neomutt, PGP encryption does not use the --hidden-recipient mode which may leak the Bcc email header field by inferring from the recipients info. | 5.3 |
2024-11-12 | CVE-2024-49393 | Improper Verification of Cryptographic Signature vulnerability in multiple products In neomutt and mutt, the To and Cc email headers are not validated by cryptographic signing which allows an attacker that intercepts a message to change their value and include himself as a one of the recipients to compromise message confidentiality. | 5.9 |
2024-10-29 | CVE-2024-50074 | Out-of-bounds Read vulnerability in multiple products In the Linux kernel, the following vulnerability has been resolved: parport: Proper fix for array out-of-bounds access The recent fix for array out-of-bounds accesses replaced sprintf() calls blindly with snprintf(). | 7.8 |
2024-10-15 | CVE-2024-9676 | Unspecified vulnerability in Redhat products A vulnerability was found in Podman, Buildah, and CRI-O. | 6.5 |
2024-10-01 | CVE-2024-9341 | A flaw was found in Go. | 8.2 |