Redhat

Enterprise Mrg

72 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Veröffentlicht 05.06.2014 17:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a lar...

  • EPSS 0.3%
  • Veröffentlicht 30.04.2014 14:22:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, uses the DES-based crypt function to hash passwords, which makes it easier for attackers to obtain sensitive information via a brute-force attack.

  • EPSS 0.1%
  • Veröffentlicht 10.02.2014 18:15:09
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple format string vulnerabilities in Condor 7.2.0 through 7.6.4, and possibly certain 7.7.x versions, as used in Red Hat MRG Grid and possibly other products, allow local users to cause a denial of service (condor_schedd daemon and failure to la...

  • EPSS 0.13%
  • Veröffentlicht 23.12.2013 22:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple cross-site request forgery (CSRF) vulnerabilities in the web interface for cumin in Red Hat Enterprise MRG Grid 2.4 allow remote attackers to hijack the authentication of cumin users for unspecified requests.

  • EPSS 0.38%
  • Veröffentlicht 23.12.2013 22:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

SQL injection vulnerability in the web interface for cumin in Red Hat Enterprise MRG Grid 2.4 allows remote attackers to execute arbitrary SQL commands via vectors related to the "filtering table operator."

  • EPSS 0.3%
  • Veröffentlicht 23.12.2013 22:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Cross-site scripting (XSS) vulnerability in the web interface for cumin in Red Hat Enterprise MRG Grid 2.4 allows remote attackers to inject arbitrary web script or HTML via the "Max allowance" field in the "Set limit" form.

  • EPSS 0.22%
  • Veröffentlicht 23.12.2013 22:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

cumin in Red Hat Enterprise MRG Grid 2.4 does not properly enforce user roles, which allows remote authenticated users to bypass intended role restrictions and obtain sensitive information or perform privileged operations via unspecified vectors.

  • EPSS 0.71%
  • Veröffentlicht 11.10.2013 22:55:39
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The policy definition evaluator in Condor 7.5.4, 8.0.0, and earlier does not properly handle attributes in a (1) PREEMPT, (2) SUSPEND, (3) CONTINUE, (4) WANT_VACATE, or (5) KILL policy that evaluate to an Unconfigured, Undefined, or Error state, whic...

  • EPSS 0.63%
  • Veröffentlicht 11.10.2013 22:55:35
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The policy definition evaluator in Condor before 7.4.2 does not properly handle attributes in a WANT_SUSPEND policy that evaluate to an UNDEFINED state, which allows remote authenticated users to cause a denial of service (condor_startd exit) via a c...

  • EPSS 0.96%
  • Veröffentlicht 10.10.2013 10:55:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c in the Linux kernel through 3.11.4 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via multiple requests for small amounts of data, l...