Vulnerabilities > Fedoraproject > Low
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2012-10-10 | CVE-2012-3504 | Permissions, Privileges, and Access Controls vulnerability in Fedoraproject Crypto-Utils 2.4.134 The nssconfigFound function in genkey.pl in crypto-utils 2.4.1-34 allows local users to overwrite arbitrary files via a symlink attack on the "list" file in the current working directory. | 3.6 |
2012-07-03 | CVE-2012-0833 | Permissions, Privileges, and Access Controls vulnerability in Fedoraproject 389 Directory Server The acllas__handle_group_entry function in servers/plugins/acl/acllas.c in 389 Directory Server before 1.2.10 does not properly handled access control instructions (ACIs) that use certificate groups, which allows remote authenticated LDAP users with a certificate group to cause a denial of service (infinite loop and CPU consumption) by binding to the server. | 2.3 |
2012-07-03 | CVE-2012-2678 | Cryptographic Issues vulnerability in multiple products 389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), after the password for a LDAP user has been changed and before the server has been reset, allows remote attackers to read the plaintext password via the unhashed#user#password attribute. | 1.2 |
2012-07-03 | CVE-2012-2746 | Cryptographic Issues vulnerability in multiple products 389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), when the password of a LDAP user has been changed and audit logging is enabled, saves the new password to the log in plain text, which allows remote authenticated users to read the password. | 2.1 |
2011-06-14 | CVE-2011-1943 | Information Exposure Through Log Files vulnerability in multiple products The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file. | 2.1 |
2011-01-25 | CVE-2010-4341 | Resource Management Errors vulnerability in multiple products The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet. | 2.1 |
2010-07-13 | CVE-2010-2008 | Command Injection vulnerability in multiple products MySQL before 5.1.48 allows remote authenticated users with alter database privileges to cause a denial of service (server crash and database loss) via an ALTER DATABASE command with a #mysql50# string followed by a . | 3.5 |
2010-06-07 | CVE-2010-1439 | Permissions, Privileges, and Access Controls vulnerability in Redhat Yum-Rhn-Plugin yum-rhn-plugin in Red Hat Network Client Tools (aka rhn-client-tools) on Red Hat Enterprise Linux (RHEL) 5 and Fedora uses world-readable permissions for the /var/spool/up2date/loginAuth.pkl file, which allows local users to access the Red Hat Network profile, and possibly prevent future security updates, by leveraging authentication data from this file. | 3.6 |
2010-01-14 | CVE-2010-0014 | Improper Authentication vulnerability in Fedoraproject Sssd System Security Services Daemon (SSSD) before 1.0.1, when the krb5 auth_provider is configured but the KDC is unreachable, allows physically proximate attackers to authenticate, via an arbitrary password, to the screen-locking program on a workstation that has any user's Kerberos ticket-granting ticket (TGT); and might allow remote attackers to bypass intended access restrictions via vectors involving an arbitrary password in conjunction with a valid TGT. | 3.7 |
2007-11-08 | CVE-2007-4129 | Link Following vulnerability in Fedoraproject Coolkey 1.1.0 CoolKey 1.1.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files in the /tmp/.pk11ipc1/ directory. | 3.3 |