Show filters
253 Total Results
Displaying 51-60 of 253
Sort by:
Attacker Value
Unknown
CVE-2012-6685
Disclosure Date: February 19, 2020 (last updated February 21, 2025)
Nokogiri before 1.5.4 is vulnerable to XXE attacks
0
Attacker Value
Unknown
CVE-2014-3590
Disclosure Date: January 02, 2020 (last updated February 21, 2025)
Versions of Foreman as shipped with Red Hat Satellite 6 does not check for a correct CSRF token in the logout action. Therefore, an attacker can log out a user by having them view specially crafted content.
0
Attacker Value
Unknown
CVE-2014-0241
Disclosure Date: December 13, 2019 (last updated November 27, 2024)
rubygem-hammer_cli_foreman: File /etc/hammer/cli.modules.d/foreman.yml world readable
0
Attacker Value
Unknown
CVE-2013-2101
Disclosure Date: December 03, 2019 (last updated November 27, 2024)
Katello has multiple XSS issues in various entities
0
Attacker Value
Unknown
CVE-2012-5562
Disclosure Date: December 02, 2019 (last updated November 27, 2024)
rhn-proxy: may transmit credentials over clear-text when accessing RHN Satellite
0
Attacker Value
Unknown
CVE-2013-6461
Disclosure Date: November 05, 2019 (last updated November 27, 2024)
Nokogiri gem 1.5.x and 1.6.x has DoS while parsing XML entities by failing to apply limits
0
Attacker Value
Unknown
CVE-2013-6460
Disclosure Date: November 05, 2019 (last updated November 27, 2024)
Nokogiri gem 1.5.x has Denial of Service via infinite loop when parsing XML documents
0
Attacker Value
Unknown
CVE-2019-17631
Disclosure Date: October 17, 2019 (last updated November 27, 2024)
From Eclipse OpenJ9 0.15 to 0.16, access to diagnostic operations such as causing a GC or creating a diagnostic file are permitted without any privilege checks.
0
Attacker Value
Unknown
CVE-2019-2999
Disclosure Date: October 16, 2019 (last updated November 27, 2024)
Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to J…
0
Attacker Value
Unknown
CVE-2019-2945
Disclosure Date: October 16, 2019 (last updated November 27, 2024)
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code…
0