Vulnerabilities > Redhat > Certificate System
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2012-08-13 | CVE-2012-3367 | Cryptographic Issues vulnerability in Redhat Certificate System and Dogtag Certificate System Red Hat Certificate System (RHCS) before 8.1.1 and Dogtag Certificate System does not properly check certificate revocation requests made through the web interface, which allows remote attackers with permissions to revoke end entity certificates to revoke the Certificate Authority (CA) certificate. | 5.5 |
2010-11-17 | CVE-2010-3869 | Cryptographic Issues vulnerability in Redhat Certificate System and Dogtag Certificate System Red Hat Certificate System (RHCS) 7.3 and 8 and Dogtag Certificate System allow remote authenticated users to generate an arbitrary number of certificates by replaying a single SCEP one-time PIN. | 4.0 |
2010-11-17 | CVE-2010-3868 | Improper Authentication vulnerability in Redhat Certificate System and Dogtag Certificate System Red Hat Certificate System (RHCS) 7.3 and 8 and Dogtag Certificate System do not require authentication for requests to decrypt SCEP one-time PINs, which allows remote attackers to obtain PINs by sniffing the network for SCEP requests and then sending decryption requests to the Certificate Authority component. | 5.8 |
2009-05-27 | CVE-2009-0588 | Unspecified vulnerability in Redhat Certificate System and Dogtag Certificate System agent/request/op.cgi in the Registration Authority (RA) component in Red Hat Certificate System (RHCS) 7.3 and Dogtag Certificate System allows remote authenticated users to approve certificate requests queued for arbitrary agent groups via a modified request ID field. | 6.5 |
2009-01-30 | CVE-2008-5082 | Improper Authentication vulnerability in Redhat Dogtag Certificate System and Certificate System The verifyProof function in the Token Processing System (TPS) component in Red Hat Certificate System (RHCS) 7.1 through 7.3 and Dogtag Certificate System 1.0 returns successfully even when token enrollment did not use the hardware key, which allows remote authenticated users with enrollment privileges to bypass intended authentication policies by performing enrollment with a software key. | 6.0 |
2009-01-20 | CVE-2008-2368 | Credentials Management vulnerability in Redhat Certificate System 7.2 Red Hat Certificate System 7.2 stores passwords in cleartext in the UserDirEnrollment log, the RA wizard installer log, and unspecified other debug log files, and uses weak permissions for these files, which allows local users to discover passwords by reading the files. | 2.1 |
2009-01-20 | CVE-2008-2367 | Permissions, Privileges, and Access Controls vulnerability in Redhat Certificate System 7.2 Red Hat Certificate System 7.2 uses world-readable permissions for password.conf and unspecified other configuration files, which allows local users to discover passwords by reading these files. | 2.1 |