Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Redhat Subscribe
Filtered by product Cloudforms
Total 47 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2012-4574 1 Redhat 1 Cloudforms 2017-08-28 2.1 LOW N/A
Pulp in Red Hat CloudForms before 1.1 uses world-readable permissions for pulp.conf, which allows local users to read the administrative password by reading this file.
CVE-2012-5605 1 Redhat 1 Cloudforms 2017-08-28 2.1 LOW N/A
Grinder in Red Hat CloudForms before 1.1 uses world-writable permissions for /var/lib/pulp/cache/grinder/, which allows local users to modify grinder cache files.
CVE-2012-5603 1 Redhat 1 Cloudforms 2017-08-28 5.5 MEDIUM N/A
proxies_controller.rb in Katello in Red Hat CloudForms before 1.1 does not properly check permissions, which allows remote authenticated users to read consumer certificates or change arbitrary users' settings via unspecified vectors related to the "consumer UUID" of a system.
CVE-2012-3538 1 Redhat 1 Cloudforms 2017-08-28 3.3 LOW N/A
Pulp in Red Hat CloudForms before 1.1 logs administrative passwords in a world-readable file, which allows local users to read pulp administrative passwords by reading production.log.
CVE-2016-4471 1 Redhat 1 Cloudforms 2017-06-15 6.5 MEDIUM 8.8 HIGH
ManageIQ in CloudForms before 4.1 allows remote authenticated users to execute arbitrary code.
CVE-2016-5383 1 Redhat 1 Cloudforms 2016-08-26 6.5 MEDIUM 8.8 HIGH
The web UI in Red Hat CloudForms 4.1 allows remote authenticated users to execute arbitrary code via vectors involving "Lack of field filters."
CVE-2013-6443 1 Redhat 2 Cloudforms, Cloudforms 3.0 Management Engine 2014-01-23 6.8 MEDIUM N/A
CloudForms 3.0 Management Engine before 5.2.1.6 allows remote attackers to bypass the Ruby on Rails protect_from_forgery mechanism and conduct cross-site request forgery (CSRF) attacks via a destructive action in a request.