Show filters
253 Total Results
Displaying 51-60 of 253
Sort by:
Attacker Value
Unknown

CVE-2012-6685

Disclosure Date: February 19, 2020 (last updated February 21, 2025)
Nokogiri before 1.5.4 is vulnerable to XXE attacks
Attacker Value
Unknown

CVE-2014-3590

Disclosure Date: January 02, 2020 (last updated February 21, 2025)
Versions of Foreman as shipped with Red Hat Satellite 6 does not check for a correct CSRF token in the logout action. Therefore, an attacker can log out a user by having them view specially crafted content.
Attacker Value
Unknown

CVE-2014-0241

Disclosure Date: December 13, 2019 (last updated November 27, 2024)
rubygem-hammer_cli_foreman: File /etc/hammer/cli.modules.d/foreman.yml world readable
Attacker Value
Unknown

CVE-2013-2101

Disclosure Date: December 03, 2019 (last updated November 27, 2024)
Katello has multiple XSS issues in various entities
Attacker Value
Unknown

CVE-2012-5562

Disclosure Date: December 02, 2019 (last updated November 27, 2024)
rhn-proxy: may transmit credentials over clear-text when accessing RHN Satellite
Attacker Value
Unknown

CVE-2013-6461

Disclosure Date: November 05, 2019 (last updated November 27, 2024)
Nokogiri gem 1.5.x and 1.6.x has DoS while parsing XML entities by failing to apply limits
Attacker Value
Unknown

CVE-2013-6460

Disclosure Date: November 05, 2019 (last updated November 27, 2024)
Nokogiri gem 1.5.x has Denial of Service via infinite loop when parsing XML documents
Attacker Value
Unknown

CVE-2019-17631

Disclosure Date: October 17, 2019 (last updated November 27, 2024)
From Eclipse OpenJ9 0.15 to 0.16, access to diagnostic operations such as causing a GC or creating a diagnostic file are permitted without any privilege checks.
Attacker Value
Unknown

CVE-2019-2999

Disclosure Date: October 16, 2019 (last updated November 27, 2024)
Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to J…
Attacker Value
Unknown

CVE-2019-2945

Disclosure Date: October 16, 2019 (last updated November 27, 2024)
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code…