Redhat

Enterprise Mrg

72 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 28.02.2013 19:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The chase_port function in drivers/usb/serial/io_ti.c in the Linux kernel before 3.7.4 allows local users to cause a denial of service (NULL pointer dereference and system crash) via an attempted /dev/ttyUSB read or write operation on a disconnected ...

  • EPSS 0.19%
  • Veröffentlicht 28.02.2013 19:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Buffer overflow in the VFAT filesystem implementation in the Linux kernel before 3.3 allows local users to gain privileges or cause a denial of service (system crash) via a VFAT write operation on a filesystem with the utf8 mount option, which is not...

  • EPSS 0.39%
  • Veröffentlicht 28.09.2012 17:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Session fixation vulnerability in Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allows remote attackers to hijack web sessions via a crafted session cookie.

Exploit
  • EPSS 0.2%
  • Veröffentlicht 28.09.2012 17:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple cross-site request forgery (CSRF) vulnerabilities in Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allow remote attackers to hijack the authentication of arbitrary users for requests that execu...

  • EPSS 0.42%
  • Veröffentlicht 28.09.2012 17:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allows remote authenticated users to modify Condor attributes and possibly gain privileges via crafted additional parameters in an HTTP POST request, which ...

Exploit
  • EPSS 1.18%
  • Veröffentlicht 28.09.2012 17:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allows remote authenticated users to cause a denial of service (memory consumption) via a large size in an image request.

  • EPSS 0.61%
  • Veröffentlicht 28.09.2012 17:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple SQL injection vulnerabilities in the get_sample_filters_by_signature function in Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allow remote attackers to execute arbitrary SQL commands via the (...

  • EPSS 0.47%
  • Veröffentlicht 28.09.2012 17:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple cross-site scripting (XSS) vulnerabilities in Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors related to (1) ...

Exploit
  • EPSS 0.65%
  • Veröffentlicht 28.09.2012 17:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, uses predictable random numbers to generate session keys, which makes it easier for remote attackers to guess the session key.

Exploit
  • EPSS 0.6%
  • Veröffentlicht 28.09.2012 17:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, does not properly restrict access to resources, which allows remote attackers to obtain sensitive information via unspecified vectors related to (1) "web pa...