Vulnerabilities > Redhat

DATE CVE VULNERABILITY TITLE RISK
2024-06-12 CVE-2024-5891 Unspecified vulnerability in Redhat Quay 3.0.0
A vulnerability was found in Quay.
network
high complexity
redhat
4.2
2024-06-12 CVE-2024-3183 Use of Password Hash With Insufficient Computational Effort vulnerability in Redhat products
A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key.
network
low complexity
redhat CWE-916
8.1
2024-06-12 CVE-2024-5742 Link Following vulnerability in multiple products
A vulnerability was found in GNU Nano that allows a possible privilege escalation through an insecure temporary file.
local
high complexity
gnu redhat CWE-59
6.7
2024-06-06 CVE-2024-3049 Insufficient Verification of Data Authenticity vulnerability in multiple products
A flaw was found in Booth, a cluster ticket manager.
network
high complexity
clusterlabs redhat CWE-345
5.9
2024-06-05 CVE-2024-5037 Authentication Bypass by Spoofing vulnerability in Redhat products
A flaw was found in OpenShift's Telemeter.
network
low complexity
redhat CWE-290
7.5
2024-06-05 CVE-2024-3716 Unspecified vulnerability in Redhat Satellite 6.0
A flaw was found in foreman-installer when puppet-candlepin is invoked cpdb with the --password parameter.
local
low complexity
redhat
6.2
2024-06-05 CVE-2024-4812 Cross-site Scripting vulnerability in multiple products
A flaw was found in the Katello plugin for Foreman, where it is possible to store malicious JavaScript code in the "Description" field of a user.
network
low complexity
redhat katello-project CWE-79
4.8
2024-04-10 CVE-2024-3567 Reachable Assertion vulnerability in multiple products
A flaw was found in QEMU.
local
low complexity
qemu redhat CWE-617
5.5
2024-02-22 CVE-2023-52160 Improper Authentication vulnerability in multiple products
The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass.
network
low complexity
debian redhat fedoraproject w1-fi CWE-287
6.5
2024-02-14 CVE-2023-50387 Allocation of Resources Without Limits or Throttling vulnerability in multiple products
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue.
7.5