Vulnerabilities > Redhat

DATE CVE VULNERABILITY TITLE RISK
2020-08-30 CVE-2020-14352 Path Traversal vulnerability in multiple products
A flaw was found in librepo in versions before 1.12.1.
network
low complexity
redhat opensuse fedoraproject CWE-22
8.0
2020-08-26 CVE-2019-14904 A flaw was found in the solaris_zone module from the Ansible Community modules.
local
low complexity
redhat debian
7.3
2020-08-24 CVE-2020-10775 Open Redirect vulnerability in multiple products
An Open redirect vulnerability was found in ovirt-engine versions 4.4 and earlier, where it allows remote attackers to redirect users to arbitrary web sites and attempt phishing attacks.
network
high complexity
oracle redhat CWE-601
5.3
2020-08-19 CVE-2020-14356 NULL Pointer Dereference vulnerability in multiple products
A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system.
7.8
2020-08-11 CVE-2020-14324 OS Command Injection vulnerability in Redhat Cloudforms Management Engine
A high severity vulnerability was found in all active versions of Red Hat CloudForms before 5.11.7.0.
network
low complexity
redhat CWE-78
critical
9.1
2020-08-11 CVE-2020-14313 Unspecified vulnerability in Redhat Quay
An information disclosure vulnerability was found in Red Hat Quay in versions before 3.3.1.
network
low complexity
redhat
4.3
2020-08-11 CVE-2020-14296 Server-Side Request Forgery (SSRF) vulnerability in Redhat Cloudforms Management Engine 4.7/5.0
Red Hat CloudForms 4.7 and 5 was vulnerable to Server-Side Request Forgery (SSRF) flaw.
network
low complexity
redhat CWE-918
7.1
2020-08-11 CVE-2020-10780 Improper Neutralization of Formula Elements in a CSV File vulnerability in Redhat Cloudforms Management Engine 4.7/5.0
Red Hat CloudForms 4.7 and 5 is affected by CSV Injection flaw, a crafted payload stays dormant till a victim export as CSV and opens the file with Excel.
network
low complexity
redhat CWE-1236
6.3
2020-08-11 CVE-2020-14325 Unspecified vulnerability in Redhat Cloudforms
Red Hat CloudForms before 5.11.7.0 was vulnerable to the User Impersonation authorization flaw which allows malicious attacker to create existent and non-existent role-based access control user, with groups and roles.
network
low complexity
redhat
critical
9.1
2020-08-11 CVE-2020-10783 Unspecified vulnerability in Redhat Cloudforms 4.7/5.0.0
Red Hat CloudForms 4.7 and 5 is affected by a role-based privilege escalation flaw.
network
low complexity
redhat
8.3