Enterprise Linux

41 CVEs product

Monthly

CVE-2026-1709 CRITICAL PATCH Act Now

Keylime attestation framework since version 7.12.0 has a TLS authentication flaw where the registrar doesn't enforce client-side certificate validation.

Authentication Bypass Enterprise Linux For Ibm Z Systems Enterprise Linux For Arm 64 Eus Keylime Enterprise Linux For Power Little Endian +7
NVD
CVSS 3.1
9.4
EPSS
0.0%
CVE-2025-14087 MEDIUM PATCH This Month

A buffer-underflow vulnerability exists in GLib's GVariant parser that allows remote attackers to trigger heap corruption through maliciously crafted input strings. This affects GNOME GLib and all versions of Red Hat Enterprise Linux (7.0 through 10.0), potentially enabling denial of service or remote code execution. The vulnerability has an EPSS score of 0.26% (percentile 49%) indicating low exploitation probability despite the moderate CVSS score of 5.6.

Denial Of Service RCE Glib Enterprise Linux Redhat +1
NVD
CVSS 3.1
5.6
EPSS
0.3%
CVE-2025-9784 HIGH PATCH This Week

Undertow, a Java web server used across Red Hat's JBoss Enterprise Application Platform, Fuse, and other middleware products, contains a vulnerability that allows attackers to trigger server-side HTTP/2 stream resets without incrementing abuse counters. This 'MadeYouReset' attack enables remote unauthenticated attackers to cause denial of service by repeatedly forcing the server to abort streams and perform unnecessary cleanup work. With an EPSS score of 1.17% (78th percentile), exploitation probability is moderate but rising, and patches have been released across multiple Red Hat product lines as of early 2025.

Denial Of Service Jboss Enterprise Application Platform Expansion Pack Jboss Enterprise Application Platform Fuse Single Sign On +5
NVD GitHub
CVSS 3.1
7.5
EPSS
1.2%
CVE-2025-7519 MEDIUM PATCH This Month

A flaw was found in polkit. When processing an XML policy with 32 or more nested elements in depth, an out-of-bounds write can be triggered. This issue can lead to a crash or other unexpected behavior, and arbitrary code execution is not discarded. To exploit this flaw, a high-privilege account is needed as it's required to place the malicious policy file properly.

RCE Buffer Overflow Memory Corruption Ubuntu Debian +4
NVD GitHub
CVSS 3.1
6.7
EPSS
0.0%
CVE-2025-32990 MEDIUM PATCH This Month

A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.

Heap Overflow Buffer Overflow Ubuntu Debian Openshift Container Platform +4
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-32989 MEDIUM PATCH This Month

A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.

Information Disclosure Ubuntu Debian Gnutls Openshift Container Platform +3
NVD
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-5351 MEDIUM PATCH This Month

A security vulnerability in A flaw (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Ubuntu Debian Libssh Enterprise Linux +3
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-5372 MEDIUM PATCH This Month

A security vulnerability in libssh (CVSS 5.0). Remediation should follow standard vulnerability management procedures.

OpenSSL Information Disclosure Ubuntu Debian Openshift Container Platform +4
NVD
CVSS 3.1
5.0
EPSS
0.1%
CVE-2025-32463 CRITICAL POC KEV PATCH THREAT Emergency

Sudo before 1.9.17p1 contains a local root escalation vulnerability (CVE-2025-32463, CVSS 9.3) through the --chroot option, which loads /etc/nsswitch.conf from the user-controlled chroot directory instead of the host system. KEV-listed with EPSS 26.5% and public PoC, this vulnerability allows any user with sudo --chroot access to achieve root privileges by placing a malicious nsswitch configuration and library in their chroot.

Information Disclosure Ubuntu Debian Leap Linux Enterprise Desktop +8
NVD Exploit-DB
CVSS 3.1
9.3
EPSS
26.5%
Threat
5.7
CVE-2025-5318 HIGH PATCH This Week

CVE-2025-5318 is an out-of-bounds read vulnerability in libssh versions before 0.11.2 caused by an incorrect comparison check in the sftp_handle function that allows authenticated remote attackers to access memory beyond the valid handle list and retrieve invalid pointers for further processing. This vulnerability enables exposure of sensitive information or denial of service, with a CVSS score of 8.1 indicating high severity. The vulnerability requires authentication and network access but has high confidentiality and availability impact.

Buffer Overflow Enterprise Linux Openshift Container Platform Libssh Redhat +1
NVD
CVSS 3.1
8.1
EPSS
0.1%
CVE-2025-5915 MEDIUM PATCH This Month

A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions.

Buffer Overflow Heap Overflow Denial Of Service Ubuntu Debian +5
NVD GitHub
CVSS 3.1
6.6
EPSS
0.0%
CVE-2025-5914 HIGH POC PATCH This Week

CVE-2025-5914 is an integer overflow vulnerability in libarchive's archive_read_format_rar_seek_data() function that leads to a double-free memory corruption condition. This affects all users of libarchive who process untrusted RAR archive files, potentially allowing arbitrary code execution or denial-of-service with user interaction (opening a malicious RAR file). While no KEV listing or confirmed public exploits are currently documented, the high CVSS score (7.8) and memory safety nature of the vulnerability indicate significant real-world risk if weaponized.

Buffer Overflow RCE Enterprise Linux Libarchive Openshift Container Platform +2
NVD GitHub
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-47711 MEDIUM PATCH This Month

CVE-2025-47711 is a security vulnerability (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Ubuntu Debian Nbdkit Enterprise Linux Advanced Virtualization +3
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-4598 MEDIUM POC PATCH Monitor

A vulnerability was found in systemd-coredump. Rated medium severity (CVSS 4.7). Public exploit code available and no vendor patch available.

Information Disclosure Linux Systemd Openshift Container Platform Enterprise Linux +4
NVD
CVSS 3.1
4.7
EPSS
0.1%
CVE-2025-4478 MEDIUM PATCH This Month

A flaw was found in the FreeRDP used by Anaconda's remote install feature, where a crafted RDP packet could trigger a segmentation fault. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. This NULL Pointer Dereference vulnerability could allow attackers to crash the application by dereferencing a null pointer.

Null Pointer Dereference Denial Of Service Freerdp Enterprise Linux Redhat +1
NVD GitHub
CVSS 3.1
6.5
EPSS
0.4%
CVE-2025-3891 HIGH PATCH This Week

A flaw was found in the mod_auth_openidc module for Apache httpd. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Apache Denial Of Service Http Server Enterprise Linux Debian Linux +2
NVD GitHub
CVSS 3.1
7.5
EPSS
1.3%
CVE-2025-46400 MEDIUM POC PATCH This Month

In xfig diagramming tool, a segmentation fault while running fig2dev allows an attacker to availability via local input manipulation via read_arcobject function. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. Public exploit code available and no vendor patch available.

Null Pointer Dereference Denial Of Service Fig2Dev Enterprise Linux Redhat +1
NVD
CVSS 3.1
5.5
EPSS
0.1%
CVE-2025-46399 MEDIUM POC PATCH This Month

A flaw was found in fig2dev. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. Public exploit code available and no vendor patch available.

Null Pointer Dereference Denial Of Service Fig2Dev Enterprise Linux Redhat +1
NVD
CVSS 3.1
5.5
EPSS
0.1%
CVE-2025-46398 MEDIUM POC PATCH This Month

In xfig diagramming tool, a stack-overflow while running fig2dev allows memory corruption via local input manipulation via read_objects function. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. Public exploit code available and no vendor patch available.

Buffer Overflow Stack Overflow Fig2Dev Enterprise Linux Redhat +1
NVD
CVSS 3.1
5.5
EPSS
0.1%
CVE-2025-46397 HIGH POC PATCH This Week

A flaw was found in xfig. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. Public exploit code available and no vendor patch available.

Buffer Overflow RCE Fig2Dev Enterprise Linux Redhat +1
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-3155 HIGH POC PATCH This Week

A flaw was found in Yelp. Rated high severity (CVSS 7.4), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Open Redirect Yelp Debian Linux Codeready Linux Builder Codeready Linux Builder For Arm64 +19
NVD GitHub
CVSS 3.1
7.4
EPSS
0.7%
CVE-2025-2784 HIGH POC PATCH This Week

A flaw was found in libsoup. Rated high severity (CVSS 7.0), this vulnerability is remotely exploitable, no authentication required. Public exploit code available and no vendor patch available.

Information Disclosure Buffer Overflow Libsoup Codeready Linux Builder Codeready Linux Builder For Arm64 +20
NVD
CVSS 3.1
7.0
EPSS
2.1%
CVE-2025-0678 HIGH PATCH This Week

A flaw was found in grub2. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.

Integer Overflow Buffer Overflow RCE Grub2 Openshift Container Platform +3
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2024-45782 HIGH PATCH This Week

A flaw was found in the HFS filesystem. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.

Information Disclosure Memory Corruption Buffer Overflow Grub2 Openshift Container Platform +3
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2024-45778 MEDIUM PATCH This Month

A stack overflow flaw was found when reading a BFS file system. Rated medium severity (CVSS 4.1). No vendor patch available.

Integer Overflow Denial Of Service Grub2 Openshift Container Platform Enterprise Linux +2
NVD VulDB
CVSS 3.1
4.1
EPSS
0.0%
CVE-2024-45777 MEDIUM PATCH This Month

A flaw was found in grub2. Rated medium severity (CVSS 6.7), this vulnerability is low attack complexity. No vendor patch available.

Memory Corruption Buffer Overflow Grub2 Openshift Enterprise Linux +2
NVD
CVSS 3.1
6.7
EPSS
0.0%
CVE-2025-26465 MEDIUM PATCH This Month

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. Rated medium severity (CVSS 6.8), this vulnerability is remotely exploitable, no authentication required. Epss exploitation probability 60.0%.

Information Disclosure Ssh Openssh Active Iq Unified Manager Ontap +5
NVD
CVSS 3.1
6.8
EPSS
60.0%
CVE-2024-12084 CRITICAL POC PATCH Act Now

A heap-based buffer overflow flaw was found in the rsync daemon. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Heap Overflow Buffer Overflow Rsync Almalinux Arch Linux +7
NVD GitHub
CVSS 3.1
9.8
EPSS
3.5%
CVE-2024-12088 MEDIUM PATCH This Month

A flaw was found in rsync. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Path Traversal Rsync Discovery Openshift Container Platform Enterprise Linux +18
NVD GitHub
CVSS 3.1
6.5
EPSS
2.9%
CVE-2024-12087 MEDIUM POC PATCH This Week

A path traversal vulnerability exists in rsync. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Path Traversal Rsync Almalinux Arch Linux Linux +16
NVD GitHub
CVSS 3.1
6.5
EPSS
3.2%
CVE-2024-12086 MEDIUM POC PATCH This Month

A flaw was found in rsync. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required. Public exploit code available and no vendor patch available.

Information Disclosure Rsync Openshift Container Platform Enterprise Linux Almalinux +7
NVD GitHub
CVSS 3.1
6.1
EPSS
0.6%
CVE-2024-12085 HIGH POC PATCH THREAT This Month

A flaw was found in rsync which could be triggered when rsync compares file checksums. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and EPSS exploitation probability 19.1%.

Information Disclosure Rsync Openshift Openshift Container Platform Enterprise Linux +20
NVD GitHub
CVSS 3.1
7.5
EPSS
19.1%
CVE-2024-0914 MEDIUM PATCH This Month

A timing side-channel vulnerability has been discovered in the opencryptoki package while processing RSA PKCS#1 v1.5 padded ciphertexts. Rated medium severity (CVSS 5.9), this vulnerability is remotely exploitable, no authentication required.

Authentication Bypass Opencryptoki Enterprise Linux
NVD
CVSS 3.1
5.9
EPSS
0.4%
CVE-2024-0553 HIGH POC This Week

A vulnerability was found in GnuTLS. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Information Disclosure Microsoft Gnutls Fedora Enterprise Linux
NVD
CVSS 3.1
7.5
EPSS
1.7%
CVE-2024-23301 MEDIUM POC PATCH This Month

Relax-and-Recover (aka ReaR) through 2.7 creates a world-readable initrd when using GRUB_RESCUE=y. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. Public exploit code available.

Privilege Escalation Relax And Recover Linux Enterprise Enterprise Linux Fedora
NVD GitHub
CVSS 3.1
5.5
EPSS
0.1%
CVE-2024-0443 MEDIUM This Month

A flaw was found in the blkgs destruction path in block/blk-cgroup.c in the Linux kernel, leading to a cgroup blkio memory leakage problem. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.

Linux Information Disclosure Linux Kernel Enterprise Linux Fedora
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2023-5455 MEDIUM This Month

A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA.

CSRF Enterprise Linux For Power Little Endian Eus Enterprise Linux For Power Big Endian Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions Enterprise Linux For Arm 64 Eus +17
NVD
CVSS 3.1
6.5
EPSS
0.3%
CVE-2024-0217 LOW PATCH Monitor

A use-after-free flaw was found in PackageKitd. Rated low severity (CVSS 3.3), this vulnerability is low attack complexity. This Use After Free vulnerability could allow attackers to access freed memory to execute arbitrary code or crash the application.

Memory Corruption Use After Free Information Disclosure Packagekit Enterprise Linux +1
NVD GitHub
CVSS 3.1
3.3
EPSS
0.0%
CVE-2024-0193 HIGH PATCH This Month

A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. This Use After Free vulnerability could allow attackers to access freed memory to execute arbitrary code or crash the application.

Linux Memory Corruption Privilege Escalation Use After Free Linux Kernel +1
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2021-3498 HIGH PATCH This Week

A heap corruption vulnerability exists in GStreamer media framework versions before 1.18.4 when parsing malformed Matroska (MKV) video files. An attacker can craft a malicious Matroska file that, when processed by a vulnerable GStreamer installation, triggers heap memory corruption leading to potential code execution with the privileges of the application using GStreamer. While not known to be actively exploited in the wild (not in KEV), a public proof-of-concept exploit is available and the EPSS score of 0.24% indicates moderate exploitation likelihood.

Information Disclosure Debian Linux Enterprise Linux Gstreamer
NVD VulDB
CVSS 3.1
7.8
EPSS
0.2%
CVE-2021-3497 HIGH PATCH This Week

A use-after-free vulnerability exists in GStreamer's Matroska demuxer that can be triggered when processing malformed video files, potentially allowing attackers to execute arbitrary code or cause application crashes. The vulnerability affects GStreamer versions before 1.18.4 and requires local access with user interaction to exploit. With an EPSS score of only 0.18% and no KEV listing, this vulnerability has low real-world exploitation probability despite its high CVSS score of 7.8.

Use After Free Denial Of Service Gstreamer Enterprise Linux Debian Linux
NVD VulDB
CVSS 3.1
7.8
EPSS
0.2%
CVE-2026-1709
EPSS 0% CVSS 9.4
CRITICAL PATCH Act Now

Keylime attestation framework since version 7.12.0 has a TLS authentication flaw where the registrar doesn't enforce client-side certificate validation.

Authentication Bypass Enterprise Linux For Ibm Z Systems Enterprise Linux For Arm 64 Eus +9
NVD
CVE-2025-14087
EPSS 0% CVSS 5.6
MEDIUM PATCH This Month

A buffer-underflow vulnerability exists in GLib's GVariant parser that allows remote attackers to trigger heap corruption through maliciously crafted input strings. This affects GNOME GLib and all versions of Red Hat Enterprise Linux (7.0 through 10.0), potentially enabling denial of service or remote code execution. The vulnerability has an EPSS score of 0.26% (percentile 49%) indicating low exploitation probability despite the moderate CVSS score of 5.6.

Denial Of Service RCE Glib +3
NVD
CVE-2025-9784
EPSS 1% CVSS 7.5
HIGH PATCH This Week

Undertow, a Java web server used across Red Hat's JBoss Enterprise Application Platform, Fuse, and other middleware products, contains a vulnerability that allows attackers to trigger server-side HTTP/2 stream resets without incrementing abuse counters. This 'MadeYouReset' attack enables remote unauthenticated attackers to cause denial of service by repeatedly forcing the server to abort streams and perform unnecessary cleanup work. With an EPSS score of 1.17% (78th percentile), exploitation probability is moderate but rising, and patches have been released across multiple Red Hat product lines as of early 2025.

Denial Of Service Jboss Enterprise Application Platform Expansion Pack Jboss Enterprise Application Platform +7
NVD GitHub
CVE-2025-7519
EPSS 0% CVSS 6.7
MEDIUM PATCH This Month

A flaw was found in polkit. When processing an XML policy with 32 or more nested elements in depth, an out-of-bounds write can be triggered. This issue can lead to a crash or other unexpected behavior, and arbitrary code execution is not discarded. To exploit this flaw, a high-privilege account is needed as it's required to place the malicious policy file properly.

RCE Buffer Overflow Memory Corruption +6
NVD GitHub
CVE-2025-32990
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.

Heap Overflow Buffer Overflow Ubuntu +6
NVD
CVE-2025-32989
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.

Information Disclosure Ubuntu Debian +5
NVD
CVE-2025-5351
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

A security vulnerability in A flaw (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Ubuntu Debian +5
NVD
CVE-2025-5372
EPSS 0% CVSS 5.0
MEDIUM PATCH This Month

A security vulnerability in libssh (CVSS 5.0). Remediation should follow standard vulnerability management procedures.

OpenSSL Information Disclosure Ubuntu +6
NVD
CVE-2025-32463
EPSS 27% 5.7 CVSS 9.3
CRITICAL POC KEV PATCH THREAT Emergency

Sudo before 1.9.17p1 contains a local root escalation vulnerability (CVE-2025-32463, CVSS 9.3) through the --chroot option, which loads /etc/nsswitch.conf from the user-controlled chroot directory instead of the host system. KEV-listed with EPSS 26.5% and public PoC, this vulnerability allows any user with sudo --chroot access to achieve root privileges by placing a malicious nsswitch configuration and library in their chroot.

Information Disclosure Ubuntu Debian +10
NVD Exploit-DB
CVE-2025-5318
EPSS 0% CVSS 8.1
HIGH PATCH This Week

CVE-2025-5318 is an out-of-bounds read vulnerability in libssh versions before 0.11.2 caused by an incorrect comparison check in the sftp_handle function that allows authenticated remote attackers to access memory beyond the valid handle list and retrieve invalid pointers for further processing. This vulnerability enables exposure of sensitive information or denial of service, with a CVSS score of 8.1 indicating high severity. The vulnerability requires authentication and network access but has high confidentiality and availability impact.

Buffer Overflow Enterprise Linux Openshift Container Platform +3
NVD
CVE-2025-5915
EPSS 0% CVSS 6.6
MEDIUM PATCH This Month

A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions.

Buffer Overflow Heap Overflow Denial Of Service +7
NVD GitHub
CVE-2025-5914
EPSS 0% CVSS 7.8
HIGH POC PATCH This Week

CVE-2025-5914 is an integer overflow vulnerability in libarchive's archive_read_format_rar_seek_data() function that leads to a double-free memory corruption condition. This affects all users of libarchive who process untrusted RAR archive files, potentially allowing arbitrary code execution or denial-of-service with user interaction (opening a malicious RAR file). While no KEV listing or confirmed public exploits are currently documented, the high CVSS score (7.8) and memory safety nature of the vulnerability indicate significant real-world risk if weaponized.

Buffer Overflow RCE Enterprise Linux +4
NVD GitHub
CVE-2025-47711
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

CVE-2025-47711 is a security vulnerability (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Ubuntu Debian +5
NVD
CVE-2025-4598
EPSS 0% CVSS 4.7
MEDIUM POC PATCH Monitor

A vulnerability was found in systemd-coredump. Rated medium severity (CVSS 4.7). Public exploit code available and no vendor patch available.

Information Disclosure Linux Systemd +6
NVD
CVE-2025-4478
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

A flaw was found in the FreeRDP used by Anaconda's remote install feature, where a crafted RDP packet could trigger a segmentation fault. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. This NULL Pointer Dereference vulnerability could allow attackers to crash the application by dereferencing a null pointer.

Null Pointer Dereference Denial Of Service Freerdp +3
NVD GitHub
CVE-2025-3891
EPSS 1% CVSS 7.5
HIGH PATCH This Week

A flaw was found in the mod_auth_openidc module for Apache httpd. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Apache Denial Of Service Http Server +4
NVD GitHub
CVE-2025-46400
EPSS 0% CVSS 5.5
MEDIUM POC PATCH This Month

In xfig diagramming tool, a segmentation fault while running fig2dev allows an attacker to availability via local input manipulation via read_arcobject function. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. Public exploit code available and no vendor patch available.

Null Pointer Dereference Denial Of Service Fig2Dev +3
NVD
CVE-2025-46399
EPSS 0% CVSS 5.5
MEDIUM POC PATCH This Month

A flaw was found in fig2dev. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. Public exploit code available and no vendor patch available.

Null Pointer Dereference Denial Of Service Fig2Dev +3
NVD
CVE-2025-46398
EPSS 0% CVSS 5.5
MEDIUM POC PATCH This Month

In xfig diagramming tool, a stack-overflow while running fig2dev allows memory corruption via local input manipulation via read_objects function. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. Public exploit code available and no vendor patch available.

Buffer Overflow Stack Overflow Fig2Dev +3
NVD
CVE-2025-46397
EPSS 0% CVSS 7.8
HIGH POC PATCH This Week

A flaw was found in xfig. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. Public exploit code available and no vendor patch available.

Buffer Overflow RCE Fig2Dev +3
NVD
CVE-2025-3155
EPSS 1% CVSS 7.4
HIGH POC PATCH This Week

A flaw was found in Yelp. Rated high severity (CVSS 7.4), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Open Redirect Yelp Debian Linux +21
NVD GitHub
CVE-2025-2784
EPSS 2% CVSS 7.0
HIGH POC PATCH This Week

A flaw was found in libsoup. Rated high severity (CVSS 7.0), this vulnerability is remotely exploitable, no authentication required. Public exploit code available and no vendor patch available.

Information Disclosure Buffer Overflow Libsoup +22
NVD
CVE-2025-0678
EPSS 0% CVSS 7.8
HIGH PATCH This Week

A flaw was found in grub2. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.

Integer Overflow Buffer Overflow RCE +5
NVD
CVE-2024-45782
EPSS 0% CVSS 7.8
HIGH PATCH This Week

A flaw was found in the HFS filesystem. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.

Information Disclosure Memory Corruption Buffer Overflow +5
NVD
CVE-2024-45778
EPSS 0% CVSS 4.1
MEDIUM PATCH This Month

A stack overflow flaw was found when reading a BFS file system. Rated medium severity (CVSS 4.1). No vendor patch available.

Integer Overflow Denial Of Service Grub2 +4
NVD VulDB
CVE-2024-45777
EPSS 0% CVSS 6.7
MEDIUM PATCH This Month

A flaw was found in grub2. Rated medium severity (CVSS 6.7), this vulnerability is low attack complexity. No vendor patch available.

Memory Corruption Buffer Overflow Grub2 +4
NVD
CVE-2025-26465
EPSS 60% CVSS 6.8
MEDIUM PATCH This Month

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. Rated medium severity (CVSS 6.8), this vulnerability is remotely exploitable, no authentication required. Epss exploitation probability 60.0%.

Information Disclosure Ssh Openssh +7
NVD
CVE-2024-12084
EPSS 3% CVSS 9.8
CRITICAL POC PATCH Act Now

A heap-based buffer overflow flaw was found in the rsync daemon. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Heap Overflow Buffer Overflow Rsync +9
NVD GitHub
CVE-2024-12088
EPSS 3% CVSS 6.5
MEDIUM PATCH This Month

A flaw was found in rsync. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Path Traversal Rsync Discovery +20
NVD GitHub
CVE-2024-12087
EPSS 3% CVSS 6.5
MEDIUM POC PATCH This Week

A path traversal vulnerability exists in rsync. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Path Traversal Rsync Almalinux +18
NVD GitHub
CVE-2024-12086
EPSS 1% CVSS 6.1
MEDIUM POC PATCH This Month

A flaw was found in rsync. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required. Public exploit code available and no vendor patch available.

Information Disclosure Rsync Openshift Container Platform +9
NVD GitHub
CVE-2024-12085
EPSS 19% CVSS 7.5
HIGH POC PATCH THREAT This Month

A flaw was found in rsync which could be triggered when rsync compares file checksums. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and EPSS exploitation probability 19.1%.

Information Disclosure Rsync Openshift +22
NVD GitHub
CVE-2024-0914
EPSS 0% CVSS 5.9
MEDIUM PATCH This Month

A timing side-channel vulnerability has been discovered in the opencryptoki package while processing RSA PKCS#1 v1.5 padded ciphertexts. Rated medium severity (CVSS 5.9), this vulnerability is remotely exploitable, no authentication required.

Authentication Bypass Opencryptoki Enterprise Linux
NVD
CVE-2024-0553
EPSS 2% CVSS 7.5
HIGH POC This Week

A vulnerability was found in GnuTLS. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Information Disclosure Microsoft Gnutls +2
NVD
CVE-2024-23301
EPSS 0% CVSS 5.5
MEDIUM POC PATCH This Month

Relax-and-Recover (aka ReaR) through 2.7 creates a world-readable initrd when using GRUB_RESCUE=y. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. Public exploit code available.

Privilege Escalation Relax And Recover Linux Enterprise +2
NVD GitHub
CVE-2024-0443
EPSS 0% CVSS 5.5
MEDIUM This Month

A flaw was found in the blkgs destruction path in block/blk-cgroup.c in the Linux kernel, leading to a cgroup blkio memory leakage problem. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.

Linux Information Disclosure Linux Kernel +2
NVD
CVE-2023-5455
EPSS 0% CVSS 6.5
MEDIUM This Month

A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA.

CSRF Enterprise Linux For Power Little Endian Eus Enterprise Linux For Power Big Endian +19
NVD
CVE-2024-0217
EPSS 0% CVSS 3.3
LOW PATCH Monitor

A use-after-free flaw was found in PackageKitd. Rated low severity (CVSS 3.3), this vulnerability is low attack complexity. This Use After Free vulnerability could allow attackers to access freed memory to execute arbitrary code or crash the application.

Memory Corruption Use After Free Information Disclosure +3
NVD GitHub
CVE-2024-0193
EPSS 0% CVSS 7.8
HIGH PATCH This Month

A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. This Use After Free vulnerability could allow attackers to access freed memory to execute arbitrary code or crash the application.

Linux Memory Corruption Privilege Escalation +3
NVD
CVE-2021-3498
EPSS 0% CVSS 7.8
HIGH PATCH This Week

A heap corruption vulnerability exists in GStreamer media framework versions before 1.18.4 when parsing malformed Matroska (MKV) video files. An attacker can craft a malicious Matroska file that, when processed by a vulnerable GStreamer installation, triggers heap memory corruption leading to potential code execution with the privileges of the application using GStreamer. While not known to be actively exploited in the wild (not in KEV), a public proof-of-concept exploit is available and the EPSS score of 0.24% indicates moderate exploitation likelihood.

Information Disclosure Debian Linux Enterprise Linux +1
NVD VulDB
CVE-2021-3497
EPSS 0% CVSS 7.8
HIGH PATCH This Week

A use-after-free vulnerability exists in GStreamer's Matroska demuxer that can be triggered when processing malformed video files, potentially allowing attackers to execute arbitrary code or cause application crashes. The vulnerability affects GStreamer versions before 1.18.4 and requires local access with user interaction to exploit. With an EPSS score of only 0.18% and no KEV listing, this vulnerability has low real-world exploitation probability despite its high CVSS score of 7.8.

Use After Free Denial Of Service Gstreamer +2
NVD VulDB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy