Redhat

Satellite

221 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 11.78%
  • Veröffentlicht 23.04.2019 19:32:56
  • Zuletzt bearbeitet 21.11.2024 04:41:23

Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protoc...

  • EPSS 5.97%
  • Veröffentlicht 23.04.2019 19:32:56
  • Zuletzt bearbeitet 21.11.2024 04:41:23

Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protoc...

  • EPSS 0.99%
  • Veröffentlicht 23.04.2019 19:32:55
  • Zuletzt bearbeitet 21.11.2024 04:41:21

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthen...

  • EPSS 0.27%
  • Veröffentlicht 23.04.2019 19:32:50
  • Zuletzt bearbeitet 21.11.2024 04:41:11

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unau...

  • EPSS 0.53%
  • Veröffentlicht 23.04.2019 16:29:00
  • Zuletzt bearbeitet 21.11.2024 04:16:31

While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using TLS *even when configured to verify the peer cert...

  • EPSS 1.62%
  • Veröffentlicht 19.04.2019 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:18:43

In Eclipse OpenJ9 prior to the 0.14.0 release, the Java bytecode verifier incorrectly allows a method to execute past the end of bytecode array causing crashes. Eclipse OpenJ9 v0.14.0 correctly detects this case and rejects the attempted class load.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 15.04.2019 12:31:42
  • Zuletzt bearbeitet 21.11.2024 04:42:48

It was discovered that a world-readable log file belonging to Candlepin component of Red Hat Satellite 6.4 leaked the credentials of the Candlepin database. A malicious user with local access to a Satellite host can use those credentials to modify th...

  • EPSS 0.09%
  • Veröffentlicht 11.04.2019 15:29:00
  • Zuletzt bearbeitet 21.11.2024 04:42:41

A lack of access control was found in the message queues maintained by Satellite's QPID broker and used by katello-agent in versions before Satellite 6.2, Satellite 6.1 optional and Satellite Capsule 6.1. A malicious user authenticated to a host regi...

  • EPSS 1.28%
  • Veröffentlicht 09.04.2019 16:29:02
  • Zuletzt bearbeitet 21.11.2024 04:42:48

In Foreman it was discovered that the delete compute resource operation, when executed from the Foreman API, leads to the disclosure of the plaintext password or token for the affected compute resource. A malicious user with the "delete_compute_resou...

Exploit
  • EPSS 0.83%
  • Veröffentlicht 11.02.2019 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:45:24

In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly ...