Vulnerabilities > Redhat

DATE CVE VULNERABILITY TITLE RISK
2013-01-13 CVE-2013-0750 Integer Overflow OR Wraparound vulnerability in multiple products
Integer overflow in the JavaScript implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted string concatenation, leading to improper memory allocation and a heap-based buffer overflow.
9.3
2013-01-13 CVE-2013-0748 Information Exposure vulnerability in multiple products
The XBL.__proto__.toString implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 makes it easier for remote attackers to bypass the ASLR protection mechanism by calling the toString function of an XBL object.
4.3
2013-01-13 CVE-2013-0746 Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 do not properly implement quickstubs that use the jsval data type for their return values, which allows remote attackers to execute arbitrary code or cause a denial of service (compartment mismatch and application crash) via crafted JavaScript code that is not properly handled during garbage collection.
network
mozilla opensuse suse redhat canonical
critical
9.3
2013-01-13 CVE-2013-0744 USE After Free vulnerability in multiple products
Use-after-free vulnerability in the TableBackgroundPainter::TableBackgroundData::Destroy function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an HTML document with a table containing many columns and column groups.
9.3
2013-01-05 CVE-2012-4550 Permissions, Privileges, and Access Controls vulnerability in Redhat Jboss Enterprise Application Platform 6.0.0
JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) before 6.0.1, when using role-based authorization for Enterprise Java Beans (EJB) access, does not call the intended authorization modules, which prevents JACC permissions from being applied and allows remote attackers to obtain access to the EJB.
network
low complexity
redhat CWE-264
6.4
2013-01-05 CVE-2012-4549 Permissions, Privileges, and Access Controls vulnerability in Redhat Jboss Enterprise Application Platform
The processInvocation function in org.jboss.as.ejb3.security.AuthorizationInterceptor in JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) before 6.0.1, authorizes all requests when no roles are allowed for an Enterprise Java Beans (EJB) method invocation, which allows attackers to bypass intended access restrictions for EJB methods.
network
redhat CWE-264
5.8
2013-01-04 CVE-2012-5605 Permissions, Privileges, and Access Controls vulnerability in Redhat Cloudforms 1.0
Grinder in Red Hat CloudForms before 1.1 uses world-writable permissions for /var/lib/pulp/cache/grinder/, which allows local users to modify grinder cache files.
local
low complexity
redhat CWE-264
2.1
2013-01-04 CVE-2012-5603 Permissions, Privileges, and Access Controls vulnerability in Redhat Cloudforms 1.0
proxies_controller.rb in Katello in Red Hat CloudForms before 1.1 does not properly check permissions, which allows remote authenticated users to read consumer certificates or change arbitrary users' settings via unspecified vectors related to the "consumer UUID" of a system.
network
low complexity
redhat CWE-264
5.5
2013-01-04 CVE-2012-5516 Information Exposure vulnerability in Redhat Enterprise Virtualization Manager
Red Hat Enterprise Virtualization Manager (RHEV-M) before 3.1, when moving disks between storage domains, does not properly wipe-after-delete, which prevents disks from being securely deleted and might allow local users to obtain sensitive information via unspecified vectors.
local
low complexity
redhat CWE-200
2.1
2013-01-04 CVE-2012-4574 Credentials Management vulnerability in Redhat Cloudforms 1.0
Pulp in Red Hat CloudForms before 1.1 uses world-readable permissions for pulp.conf, which allows local users to read the administrative password by reading this file.
local
low complexity
redhat CWE-255
2.1