Vulnerabilities > Redhat > Enterprise Linux > Low
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2012-08-16 | CVE-2012-4290 | Resource Management Errors vulnerability in multiple products The CTDB dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a malformed packet. | 3.3 |
2012-08-16 | CVE-2012-4291 | Resource Management Errors vulnerability in multiple products The CIP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet. | 3.3 |
2012-04-11 | CVE-2012-0042 | Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 does not properly perform certain string conversions, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet, related to epan/to_str.c. | 2.9 |
2010-06-07 | CVE-2010-1439 | Permissions, Privileges, and Access Controls vulnerability in Redhat Yum-Rhn-Plugin yum-rhn-plugin in Red Hat Network Client Tools (aka rhn-client-tools) on Red Hat Enterprise Linux (RHEL) 5 and Fedora uses world-readable permissions for the /var/spool/up2date/loginAuth.pkl file, which allows local users to access the Red Hat Network profile, and possibly prevent future security updates, by leveraging authentication data from this file. | 3.6 |
2010-05-12 | CVE-2010-0730 | Improper Input Validation vulnerability in Redhat Enterprise Linux and Enterprise Linux Desktop The MMIO instruction decoder in the Xen hypervisor in the Linux kernel 2.6.18 in Red Hat Enterprise Linux (RHEL) 5 allows guest OS users to cause a denial of service (32-bit guest OS crash) via vectors that trigger an unspecified instruction emulation. | 2.6 |
2008-08-18 | CVE-2008-3270 | Cryptographic Issues vulnerability in Redhat Enterprise Linux 5.0 yum-rhn-plugin in Red Hat Enterprise Linux (RHEL) 5 does not verify the SSL certificate for a file download from a Red Hat Network (RHN) server, which makes it easier for remote man-in-the-middle attackers to cause a denial of service (loss of updates) or force the download and installation of official Red Hat packages that were not requested. | 2.6 |
2008-05-23 | CVE-2007-5496 | Cross-Site Scripting vulnerability in Selinux Setroubleshoot 2.0.5 Cross-site scripting (XSS) vulnerability in setroubleshoot 2.0.5 allows local users to inject arbitrary web script or HTML via a crafted (1) file or (2) process name, which triggers an Access Vector Cache (AVC) log entry in a log file used during composition of HTML documents for sealert. | 1.9 |
2008-05-14 | CVE-2008-1943 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Xensource XEN Buffer overflow in the backend of XenSource Xen Para Virtualized Frame Buffer (PVFB) 3.0 through 3.1.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted description of a shared framebuffer. | 2.1 |
2007-11-10 | CVE-2007-4570 | Improper Input Validation vulnerability in Redhat Mcstrans 0.2.3 Algorithmic complexity vulnerability in the MCS translation daemon in mcstrans 0.2.3 allows local users to cause a denial of service (temporary daemon outage) via a large range of compartments in sensitivity labels. | 1.9 |
2007-11-08 | CVE-2007-4129 | Link Following vulnerability in Fedoraproject Coolkey 1.1.0 CoolKey 1.1.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files in the /tmp/.pk11ipc1/ directory. | 3.3 |