Latest CVE Feed
-
6.5
MEDIUMCVE-2017-2668
389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind req... Read more
- Published: Jun. 22, 2018
- Modified: Nov. 21, 2024
-
8.1
HIGHCVE-2017-2667
Hammer CLI, a CLI utility for Foreman, before version 0.10.0, did not explicitly set the verify_ssl flag for apipie-bindings that disable it by default. As a result the server certificates are not checked and connections are prone to man-in-the-middle att... Read more
- Published: Mar. 12, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2017-2666
It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data... Read more
- Published: Jul. 27, 2018
- Modified: Nov. 21, 2024
-
7.0
HIGHCVE-2017-2665
The skyring-setup command creates random password for mongodb skyring database but it writes password in plain text to /etc/skyring/skyring.conf file which is owned by root but read by local user. Any local user who has access to system running skyring se... Read more
- Published: Jul. 06, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2017-2664
CloudForms Management Engine (cfme) before 5.7.3 and 5.8.x before 5.8.1 lacks RBAC controls on certain methods in the rails application portion of CloudForms. An attacker with access could use a variety of methods within the rails application portion of C... Read more
- Published: Jul. 26, 2018
- Modified: Nov. 21, 2024
-
8.2
HIGHCVE-2017-2663
It was found that subscription-manager's DBus interface before 1.19.4 let unprivileged user access the com.redhat.RHSM1.Facts.GetFacts and com.redhat.RHSM1.Config.Set methods. An unprivileged local attacker could use these methods to gain access to privat... Read more
Affected Products : subscription-manager- Published: Jul. 27, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2017-2662
A flaw was found in Foreman's katello plugin version 3.4.5. After setting a new role to allow restricted access on a repository with a filter (filter set on the Product Name), the filter is not respected when the actions are done via hammer using the repo... Read more
- Published: Aug. 22, 2018
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2017-2661
ClusterLabs pcs before version 0.9.157 is vulnerable to a cross-site scripting vulnerability due to improper validation of Node name field when creating new cluster or adding existing cluster.... Read more
Affected Products : pcs- Published: Mar. 12, 2018
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2017-2659
It was found that dropbear before version 2013.59 with GSSAPI leaks whether given username is valid or invalid. When an invalid username is given, the GSSAPI authentication failure was incorrectly counted towards the maximum allowed number of password att... Read more
Affected Products : dropbear_ssh- Published: Mar. 21, 2019
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2017-2658
It was discovered that the Dashbuilder login page as used in Red Hat JBoss BPM Suite before 6.4.2 and Red Hat JBoss Data Virtualization & Services before 6.4.3 could be opened in an IFRAME, which made it possible to intercept and manipulate requests. An a... Read more
- Published: Jul. 27, 2018
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2017-2654
jenkins-email-ext before version 2.57.1 is vulnerable to an Information Exposure. The Email Extension Plugins is able to send emails to a dynamically created list of users based on the changelogs, like authors of SCM changes since the last successful buil... Read more
Affected Products : email_extension- Published: Aug. 06, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2017-2653
A number of unused delete routes are present in CloudForms before 5.7.2.1 which can be accessed via GET requests instead of just POST requests. This could allow an attacker to bypass the protect_from_forgery XSRF protection causing the routes to be used. ... Read more
- Published: Jul. 27, 2018
- Modified: Nov. 21, 2024
-
9.0
HIGHCVE-2017-2652
It was found that there were no permission checks performed in the Distributed Fork plugin before and including 1.5.0 for Jenkins that provides the dist-fork CLI command beyond the basic check for Overall/Read permission, allowing anyone with that permiss... Read more
Affected Products : distributed_fork- Published: Jul. 27, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2017-2651
jenkins-mailer-plugin before version 1.20 is vulnerable to an information disclosure while using the feature to send emails to a dynamically created list of users based on the changelogs. This could in some cases result in emails being sent to people who ... Read more
Affected Products : mailer- Published: Jul. 27, 2018
- Modified: Nov. 21, 2024
-
8.5
HIGHCVE-2017-2650
It was found that the use of Pipeline: Classpath Step Jenkins plugin enables a bypass of the Script Security sandbox for users with SCM commit access, as well as users with e.g. Job/Configure permission in Jenkins.... Read more
Affected Products : pipeline_classpath_step- Published: Jul. 27, 2018
- Modified: Nov. 21, 2024
-
8.1
HIGHCVE-2017-2649
It was found that the Active Directory Plugin for Jenkins up to and including version 2.2 did not verify certificates of the Active Directory server, thereby enabling Man-in-the-Middle attacks.... Read more
Affected Products : active_directory- Published: Jul. 27, 2018
- Modified: Nov. 21, 2024
-
6.8
MEDIUMCVE-2017-2648
It was found that jenkins-ssh-slaves-plugin before version 1.15 did not perform host key verification, thereby enabling Man-in-the-Middle attacks.... Read more
Affected Products : ssh_slaves- Published: Jul. 27, 2018
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2017-2646
It was found that when Keycloak before 2.5.5 receives a Logout request with a Extensions in the middle of the request, the SAMLSloRequestParser.parse() method ends in a infinite loop. An attacker could use this flaw to conduct denial of service attacks.... Read more
Affected Products : keycloak- Published: Jul. 27, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2017-2640
An out-of-bounds write flaw was found in the way Pidgin before 2.12.0 processed XML content. A malicious remote server could potentially use this flaw to crash Pidgin or execute arbitrary code in the context of the pidgin process.... Read more
- Published: Jul. 27, 2018
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2017-2639
It was found that CloudForms does not verify that the server hostname matches the domain name in the certificate when using a custom CA and communicating with Red Hat Virtualization (RHEV) and OpenShift. This would allow an attacker to spoof RHEV or OpenS... Read more
- Published: Jul. 27, 2018
- Modified: Nov. 21, 2024