Vulnerabilities (CVE)

Filtered by vendor Redhat Subscribe
Total 5729 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2014-4660 1 Redhat 1 Ansible 2024-11-21 2.1 LOW 5.5 MEDIUM
Ansible before 1.5.5 constructs filenames containing user and password fields on the basis of deb lines in sources.list, which might allow local users to obtain sensitive credential information in opportunistic circumstances by leveraging existence of a file that uses the "deb http://user:pass@server:port/" format.
CVE-2014-4659 1 Redhat 1 Ansible 2024-11-21 2.1 LOW 5.5 MEDIUM
Ansible before 1.5.5 sets 0644 permissions for sources.list, which might allow local users to obtain sensitive credential information in opportunistic circumstances by reading a file that uses the "deb http://user:pass@server:port/" format.
CVE-2014-4658 1 Redhat 1 Ansible 2024-11-21 2.1 LOW 5.5 MEDIUM
The vault subsystem in Ansible before 1.5.5 does not set the umask before creation or modification of a vault file, which allows local users to obtain sensitive key information by reading a file.
CVE-2014-4657 1 Redhat 1 Ansible 2024-11-21 7.5 HIGH 9.8 CRITICAL
The safe_eval function in Ansible before 1.5.4 does not properly restrict the code subset, which allows remote attackers to execute arbitrary code via crafted instructions.
CVE-2014-4650 2 Python, Redhat 3 Python, Enterprise Linux, Software Collections 2024-11-21 7.5 HIGH 9.8 CRITICAL
The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.
CVE-2014-3701 1 Redhat 2 Edeploy, Jboss Enterprise Web Server 2024-11-21 9.3 HIGH 8.1 HIGH
eDeploy has tmp file race condition flaws
CVE-2014-3700 1 Redhat 2 Edeploy, Jboss Enterprise Web Server 2024-11-21 7.5 HIGH 9.8 CRITICAL
eDeploy through at least 2014-10-14 has remote code execution due to eval() of untrusted data
CVE-2014-3699 1 Redhat 2 Edeploy, Jboss Enterprise Web Server 2024-11-21 7.5 HIGH 9.8 CRITICAL
eDeploy has RCE via cPickle deserialization of untrusted data
CVE-2014-3656 1 Redhat 1 Jboss Keycloak 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
JBoss KeyCloak: XSS in login-status-iframe.html
CVE-2014-3655 1 Redhat 2 Jboss Enterprise Web Server, Keycloak 2024-11-21 4.3 MEDIUM 4.3 MEDIUM
JBoss KeyCloak is vulnerable to soft token deletion via CSRF
CVE-2014-3652 1 Redhat 1 Keycloak 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
JBoss KeyCloak: Open redirect vulnerability via failure to validate the redirect URL.
CVE-2014-3650 1 Redhat 1 Jboss Aerogear 2024-11-21 3.5 LOW 5.4 MEDIUM
Multiple persistent cross-site scripting (XSS) flaws were found in the way Aerogear handled certain user-supplied content. A remote attacker could use these flaws to compromise the application with specially crafted input.
CVE-2014-3649 1 Redhat 1 Jboss Aerogear 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
JBoss AeroGear has reflected XSS via the password field
CVE-2014-3648 1 Redhat 1 Jboss Aerogear 2024-11-21 5.0 MEDIUM 7.5 HIGH
The simplepush server iterates through the application installations and pushes a notification to the server provided by deviceToken. But this is user controlled. If a bogus applications is registered with bad deviceTokens, one can generate endless exceptions when those endpoints can't be reached or can slow the server down by purposefully wasting it's time with slow endpoints. Similarly, one can provide whatever HTTP end point they want. This turns the server into a DDOS vector or an anonymizer for the posting of malware and so on.
CVE-2014-3599 1 Redhat 1 Hornetq 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
HornetQ REST is vulnerable to XML External Entity due to insecure configuration of RestEasy
CVE-2014-3592 1 Redhat 1 Openshift Origin 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
OpenShift Origin: Improperly validated team names could allow stored XSS attacks
CVE-2014-3590 1 Redhat 1 Satellite 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
Versions of Foreman as shipped with Red Hat Satellite 6 does not check for a correct CSRF token in the logout action. Therefore, an attacker can log out a user by having them view specially crafted content.
CVE-2014-3585 1 Redhat 2 Enterprise Linux, Redhat-upgrade-tool 2024-11-21 10.0 HIGH 9.8 CRITICAL
redhat-upgrade-tool: Does not check GPG signatures when upgrading versions
CVE-2014-3536 1 Redhat 1 Cloudforms Management Engine 2024-11-21 2.1 LOW 5.5 MEDIUM
CFME (CloudForms Management Engine) 5: RHN account information is logged to top_output.log during registration
CVE-2014-2686 1 Redhat 1 Ansible 2024-11-21 5.0 MEDIUM 7.5 HIGH
Ansible prior to 1.5.4 mishandles the evaluation of some strings.