Lucene search

K

Enterprise Linux Security Vulnerabilities - March 2020

cve
cve

CVE-2019-10146

A Reflected Cross Site Scripting flaw was found in all pki-core 10.x.x versions module from the pki-core server due to the CA Agent Service not properly sanitizing the certificate request page. An attacker could inject a specially crafted value that will be executed on the victim's browser.

4.7CVSS

5.4AI Score

0.001EPSS

2020-03-18 03:15 PM
100
cve
cve

CVE-2019-10179

A vulnerability was found in all pki-core 10.x.x versions, where the Key Recovery Authority (KRA) Agent Service did not properly sanitize recovery request search page, enabling a Reflected Cross Site Scripting (XSS) vulnerability. An attacker could trick an authenticated victim into executing speci...

6.1CVSS

6.1AI Score

0.001EPSS

2020-03-20 03:15 PM
113
cve
cve

CVE-2019-10221

A Reflected Cross Site Scripting vulnerability was found in all pki-core 10.x.x versions, where the pki-ca module from the pki-core server. This flaw is caused by missing sanitization of the GET URL parameters. An attacker could abuse this flaw to trick an authenticated user into clicking a special...

6.1CVSS

6.7AI Score

0.001EPSS

2020-03-20 03:15 PM
126
cve
cve

CVE-2020-10696

A path traversal flaw was found in Buildah in versions before 1.14.5. This flaw allows an attacker to trick a user into building a malicious container image hosted on an HTTP(s) server and then write files to the user's system anywhere that the user has permissions.

8.8CVSS

8.3AI Score

0.004EPSS

2020-03-31 10:15 PM
505
cve
cve

CVE-2020-1712

A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by se...

7.8CVSS

7.6AI Score

0.001EPSS

2020-03-31 05:15 PM
219
2
cve
cve

CVE-2020-1720

A flaw was found in PostgreSQL's "ALTER ... DEPENDS ON EXTENSION", where sub-commands did not perform authorization checks. An authenticated attacker could use this flaw in certain configurations to perform drop objects such as function, triggers, et al., leading to database corruption. This issue ...

6.5CVSS

6.5AI Score

0.001EPSS

2020-03-17 04:15 PM
383
2