Vulnerabilities > Redhat > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-06-30 | CVE-2023-1206 | Resource Exhaustion vulnerability in multiple products A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. | 5.7 |
2023-06-23 | CVE-2023-3212 | NULL Pointer Dereference vulnerability in multiple products A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. | 4.4 |
2023-06-12 | CVE-2023-3161 | Incorrect Calculation vulnerability in multiple products A flaw was found in the Framebuffer Console (fbcon) in the Linux Kernel. | 5.5 |
2023-06-09 | CVE-2023-2455 | Row security policies disregard user ID changes after inlining; PostgreSQL could permit incorrect policies to be applied in certain cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. | 5.4 |
2023-06-06 | CVE-2023-2253 | Allocation of Resources Without Limits or Throttling vulnerability in Redhat products A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). | 6.5 |
2023-05-30 | CVE-2023-34151 | Integer Overflow or Wraparound vulnerability in multiple products A vulnerability was found in ImageMagick. | 5.5 |
2023-05-26 | CVE-2023-1664 | Improper Certificate Validation vulnerability in Redhat products A flaw was found in Keycloak. | 6.5 |
2023-05-26 | CVE-2023-1667 | NULL Pointer Dereference vulnerability in multiple products A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. | 6.5 |
2023-05-26 | CVE-2023-1981 | Resource Exhaustion vulnerability in multiple products A vulnerability was found in the avahi library. | 5.5 |
2023-05-26 | CVE-2023-2283 | Improper Authentication vulnerability in multiple products A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. | 6.5 |