Vulnerabilities > Redhat > Enterprise Linux HPC Node > Medium

DATE CVE VULNERABILITY TITLE RISK
2015-12-15 CVE-2015-8317 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
The xmlParseXMLDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive information via an (1) unterminated encoding value or (2) incomplete XML declaration in XML data, which triggers an out-of-bounds heap read.
network
low complexity
debian canonical xmlsoft redhat hp CWE-119
5.0
2015-12-15 CVE-2015-8242 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (stack-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
5.8
2015-12-15 CVE-2015-8241 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
The xmlNextChar function in libxml2 2.9.2 does not properly check the state, which allows context-dependent attackers to cause a denial of service (heap-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
network
low complexity
debian redhat hp canonical xmlsoft CWE-119
6.4
2015-12-07 CVE-2015-5287 Link Following vulnerability in Redhat products
The abrt-hook-ccpp help program in Automatic Bug Reporting Tool (ABRT) before 2.7.1 allows local users with certain permissions to gain privileges via a symlink attack on a file with a predictable name, as demonstrated by /var/tmp/abrt/abrt-hax-coredump or /var/spool/abrt/abrt-hax-coredump.
local
redhat CWE-59
6.9
2015-11-24 CVE-2015-7981 Information Exposure vulnerability in multiple products
The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.
network
low complexity
canonical debian redhat libpng CWE-200
5.0
2015-10-09 CVE-2015-5235 Improper Input Validation vulnerability in multiple products
IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly determine the origin of unsigned applets, which allows remote attackers to bypass the approval process or trick users into approving applet execution via a crafted web page.
4.3
2015-10-09 CVE-2015-5234 Improper Input Validation vulnerability in multiple products
IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly sanitize applet URLs, which allows remote attackers to inject applets into the .appletTrustSettings configuration file and bypass user approval to execute the applet via a crafted web page, possibly related to line breaks.
6.8
2015-06-15 CVE-2015-4142 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.
4.3
2015-06-09 CVE-2015-4148 Improper Input Validation vulnerability in multiple products
The do_soap_call function in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that the uri property is a string, which allows remote attackers to obtain sensitive information by providing crafted serialized data with an int data type, related to a "type confusion" issue.
network
low complexity
apple redhat php CWE-20
5.0
2015-06-09 CVE-2015-4024 Resource Management Errors vulnerability in multiple products
Algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc1867.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote attackers to cause a denial of service (CPU consumption) via crafted form data that triggers an improper order-of-growth outcome.
network
low complexity
redhat apple php hp oracle CWE-399
5.0