Vulnerabilities > Redhat > Low

DATE CVE VULNERABILITY TITLE RISK
2022-06-02 CVE-2022-1462 Race Condition vulnerability in multiple products
An out-of-bounds read flaw was found in the Linux kernel’s TeleTYpe subsystem.
3.3
2022-05-24 CVE-2021-3597 Race Condition vulnerability in Redhat products
A flaw was found in undertow.
network
high complexity
redhat CWE-362
2.6
2022-05-18 CVE-2022-30596 Cross-site Scripting vulnerability in multiple products
A flaw was found in moodle where ID numbers displayed when bulk allocating markers to assignments required additional sanitizing to prevent a stored XSS risk.
3.5
2022-05-17 CVE-2022-1706 Incorrect Authorization vulnerability in Redhat products
A vulnerability was found in Ignition where ignition configs are accessible from unprivileged containers in VMs running on VMware products.
network
redhat CWE-863
3.5
2022-05-11 CVE-2021-3611 Out-of-bounds Write vulnerability in multiple products
A stack overflow vulnerability was found in the Intel HD Audio device (intel-hda) of QEMU.
local
low complexity
qemu redhat CWE-787
2.1
2022-04-29 CVE-2022-1353 A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel.
local
low complexity
linux debian redhat
3.6
2022-04-18 CVE-2021-3681 Insufficiently Protected Credentials vulnerability in Redhat Ansible Automation Platform and Ansible Galaxy
A flaw was found in Ansible Galaxy Collections.
local
low complexity
redhat CWE-522
2.1
2022-04-13 CVE-2022-1280 Use After Free vulnerability in multiple products
A use-after-free vulnerability was found in drm_lease_held in drivers/gpu/drm/drm_lease.c in the Linux kernel due to a race problem.
3.3
2022-04-01 CVE-2021-3461 Insufficient Session Expiration vulnerability in Redhat Keycloak and Single Sign-On
A flaw was found in keycloak where keycloak may fail to logout user session if the logout request comes from external SAML identity provider and Principal Type is set to Attribute [Name].
local
redhat CWE-613
3.3
2022-03-30 CVE-2020-35501 Incorrect Authorization vulnerability in multiple products
A flaw was found in the Linux kernels implementation of audit rules, where a syscall can unexpectedly not be correctly not be logged by the audit subsystem
local
low complexity
linux redhat CWE-863
3.6