Page 3 of 17 results (0.010 seconds)

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

spacewalk-backend in Red Hat Network Satellite 5.4 on Red Hat Enterprise Linux 6 does not properly authorize or authenticate uploads to the NULL organization when mod_wsgi is used, which allows remote attackers to cause a denial of service (/var partition disk consumption and failed updates) via a large number of package uploads. spacewalk-backend de Red Hat Network Satellite 5.4 de Red Hat Enterprise Linux 6 no autoriza ni autentica apropiadamente las subidas a la organización NULL si mod_wsgi es utilizado, lo que permite a atacantes remotos provocar una denegación de servicio (consumo de la partición de disco /var y actualizaciones fallidas) a través de un gran número de subida de paquetes. • http://rhn.redhat.com/errata/RHSA-2012-0436.html http://secunia.com/advisories/48664 http://www.osvdb.org/81481 http://www.securityfocus.com/bid/52832 http://www.securitytracker.com/id?1026873 https://exchange.xforce.ibmcloud.com/vulnerabilities/74498 https://access.redhat.com/security/cve/CVE-2012-1145 https://bugzilla.redhat.com/show_bug.cgi?id=800688 • CWE-287: Improper Authentication •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Spacewalk-backend in Red Hat Network (RHN) Satellite and Proxy 5.4 includes cleartext user passwords in an error message when a system registration XML-RPC call fails, which allows remote administrators to obtain the password by reading (1) the server log and (2) an email. El backend de Spacewalk en Red Hat Network (RHN) Satellite y Proxy 5.4 incluye contraseñas de usuario en texto claro en un mensaje de error cuando la llamada XML-RPC del registro del sistema falla, permite a administradores remotos obtener la contraseña mediante la lectura de (1) las trazas del servidor y (2) un correo. • http://rhn.redhat.com/errata/RHSA-2012-0101.html http://rhn.redhat.com/errata/RHSA-2012-0102.html https://access.redhat.com/security/cve/CVE-2012-0059 https://bugzilla.redhat.com/show_bug.cgi?id=782819 • CWE-310: Cryptographic Issues •

CVSS: 10.0EPSS: 96%CPEs: 98EXPL: 1

Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting. Vulnerabilidad no especificada en el componente de Java Runtime Environment en Oracle Java SE JDK y JRE v7 y v6 Update 27 y anteriores permite a aplicaciones remotas Java Web Start y applets Java no confiables afectar a la confidencialidad, integridad y disponibilidad a través de vectores desconocidos relacionados con secuencias de comandos. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Java handles Rhino Javascript errors. The built-in javascript engine in Java fails to perform sufficient sanitation on javascript error objects. • https://www.exploit-db.com/exploits/18171 http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html http://marc.info/?l=bugtraq&m=132750579901589&w=2 http://marc.info/?l=bugtraq&m=134254866602253&w=2 http://marc.info/?l=bugtraq&m=134254957702612&w=2 http://rhn.redhat.com/errata/RHSA-2013-1455.html http://secunia.com/advisories/48308 http://security.gentoo.org/glsa/glsa-201406-32.xml http://www.ibm.com/developerworks/java/jdk/alerts http://ww •

CVSS: 6.4EPSS: 0%CPEs: 2EXPL: 0

Red Hat Network (RHN) Satellite Server 5.3 and 5.4 does not properly rewrite unspecified URLs, which allows remote attackers to (1) obtain unspecified sensitive host information or (2) use the server as an inadvertent proxy to connect to arbitrary services and IP addresses via unspecified vectors. Red Hat Network (RHN) Satellite Server 5.3 y 5.4 no reescribe correctamente URLs no especificadas, lo que permite a atacantes remotos (1) obtener información sensible no especificado del anfitrión o (2) utilizar el servidor como un proxy inadvertido para conectar con servicios y direcciones IP arbitrarios a través de vectores no especificados. • http://secunia.com/advisories/44150 http://www.redhat.com/support/errata/RHSA-2011-0434.html http://www.securityfocus.com/bid/47316 http://www.securitytracker.com/id?1025316 http://www.vupen.com/english/advisories/2011/0967 https://bugzilla.redhat.com/show_bug.cgi?id=491365 https://exchange.xforce.ibmcloud.com/vulnerabilities/66691 https://access.redhat.com/security/cve/CVE-2009-0788 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

Red Hat Network (RHN) Satellite 5.3 and 5.4 exposes a dangerous, obsolete XML-RPC API, which allows remote authenticated users to access arbitrary files and cause a denial of service (failed yum operations) via vectors related to configuration and package group (comps.xml) files for channels. Vulnerabilidad de redirección abierta en el obsoleto API de XML-RPC en Red Hat Network (RHN) Satellite v5.3 y v5.4, que permite a usuarios remotos autenticados acceder a archivos arbitrarios y causar una denegación de servicio (operaciones fallida de YUM) a través de vectores relacionados con la de configuración y el paquete (comps.xml )de archivos de los canales. • http://secunia.com/advisories/44150 http://www.redhat.com/support/errata/RHSA-2011-0434.html http://www.securityfocus.com/bid/47316 http://www.securitytracker.com/id?1025316 http://www.vupen.com/english/advisories/2011/0967 https://bugzilla.redhat.com/show_bug.cgi?id=584118 https://exchange.xforce.ibmcloud.com/vulnerabilities/66690 https://access.redhat.com/security/cve/CVE-2010-1171 • CWE-264: Permissions, Privileges, and Access Controls •