PRIOn Logo

Search KB


Search our pre-analyzed vulnerability database

Total Results: 5209

of 261

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Fedoraproject, Gnu, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.9

A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.

Published:   Updated:

Vulnerability Type: Hardcoded credentials

Vendor(s):  Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

A flaw was found in libnbd, due to a malicious Network Block Device (NBD), a protocol for accessing Block Devices such as hard disks over a Network. This issue may allow a malicious NBD server to cause a Denial of Service.

Published:   Updated:

Vulnerability Type: Null pointer dereference

Vendor(s):  Linux, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.

Published:   Updated:

Vulnerability Type: Heap overflow

Vendor(s):  Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v34.3

An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This flaw allows a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data to be printed (and potentially leaked) to the kernel ring buffer (dmesg).

Published:   Updated:

Vulnerability Type: Path traversal

Vendor(s):  Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

A path traversal vulnerability exists in Ansible when extracting tarballs. An attacker could craft a malicious tarball so that when using the galaxy importer of Ansible Automation Hub, a symlink could be dropped on the disk, resulting in files being overwritten.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Fedoraproject, Moodle, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.1

The course upload preview contained an XSS risk for users uploading unsafe data.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Fedoraproject, Moodle, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

ID numbers displayed in the quiz grading report required additional sanitizing to prevent a stored XSS risk.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Fedoraproject, Moodle, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

Wiki comments required additional sanitizing and access restrictions to prevent a stored XSS risk and potential IDOR risk.

Published:   Updated:

Vulnerability Type: Race condition

Vendor(s):  Fedoraproject, Linux, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.4

A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

A flaw was found in wildfly-core. A management user could use the resolve-expression in the HAL Interface to read possible sensitive information from the Wildfly system. This issue could allow a malicious user to access the system and obtain possible sensitive information from the system.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v34.3

A flaw was found in Quay. Clickjacking is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they intend to click on the top-level page. During the pentest, it has been detected that the config-editor page is vulnerable to clickjacking. This flaw allows an attacker to trick an administrator user into clicking on buttons on the config-editor panel, possibly reconfiguring some parts of the Quay instance.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Opensc project, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v33.8

An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security.

Published:   Updated:

Vulnerability Type: Input validation

Vendor(s):  Opensc project, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.4

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Opensc project, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.6

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

Published:   Updated:

Vulnerability Type: Input validation

Vendor(s):  Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5

A flaw was found In 3Scale Admin Portal. If a user logs out from the personal tokens page and then presses the back button in the browser, the tokens page is rendered from the browser cache.

Published:   Updated:

Vulnerability Type: Race condition

Vendor(s):  Linux, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5

A flaw was found in KVM. An improper check in svm_set_x2apic_msr_interception() may allow direct access to host x2apic msrs when the guest resets its apic, potentially leading to a denial of service condition.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Redhat, Samba
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

A vulnerability was found in Samba's "rpcecho" development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the "rpcecho" service operates with only one worker in the main RPC task, allowing calls to the "rpcecho" server to be blocked for a specified time, causing service disruptions. This disruption is triggered by a "sleep()" call in the "dcesrv_echo_TestSleep()" function under specific conditions. Authenticated users or attackers can exploit this vulnerability to make calls to the "rpcecho" server, requesting it to block for a specified duration, effectively disrupting most services and leading to a complete denial of service on the AD DC. The DoS affects all other services as "rpcecho" runs in the main RPC task.

Published:   Updated:

Vulnerability Type: Code injection

Vendor(s):  Qemu, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37

A bug in QEMU could cause a guest I/O operation otherwise addressed to an arbitrary disk offset to be targeted to offset 0 instead (potentially overwriting the VM's boot code). This could be used, for example, by L2 guests with a virtual disk (vdiskL2) stored on a virtual disk of an L1 (vdiskL1) hypervisor to read and/or write data to LBA 0 of vdiskL1, potentially gaining control of L1 at its next reboot.

Published:   Updated:

Vulnerability Type: Path traversal

Vendor(s):  Fedoraproject, Redhat, Samba
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. Samba typically uses this mechanism to connect SMB clients to remote procedure call (RPC) services like SAMR LSA or SPOOLSS, which Samba initiates on demand. However, due to inadequate sanitization of incoming client pipe names, allowing a client to send a pipe name containing Unix directory traversal characters (../). This could result in SMB clients connecting as root to Unix domain sockets outside the private directory. If an attacker or client managed to send a pipe name resolving to an external service using an existing Unix domain socket, it could potentially lead to unauthorized access to the service and consequential adverse events, including compromise or service crashes.

Published:   Updated:

Vulnerability Type: Race condition

Vendor(s):  Linux, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37

A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.

of 261