VARIoT IoT vulnerabilities database

VAR-202001-1810 | CVE-2020-7249 | SMC Networks SMC D3G0804W cross-site scripting vulnerability |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
SMC D3G0804W 3.5.2.5-LAT_GA devices allow XSS via the SSID field on the WiFi Network Configuration page (after a successful login to the admin account). SMC D3G0804W The device contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified. SMC Networks SMC D3G0804W is a wireless router made by SMC Networks in the United States.
SMC Networks SMC D3G0804W 3.5.2.5-LAT_GA version has a cross-site scripting vulnerability. The vulnerability stems from the lack of correct verification of client data in WEB applications. An attacker can use this vulnerability to execute client code
VAR-202001-1785 | CVE-2020-7240 | Meinberg Lantime M300 and M1000 In the device OS Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
Meinberg Lantime M300 and M1000 devices allow attackers (with privileges to configure a device) to execute arbitrary OS commands by editing the /config/netconf.cmd script (aka Extended Network Configuration). Note: According to the description, the vulnerability requires a fully authenticated super-user account using a webUI function that allows super users to edit a script supposed to execute OS commands. The given weakness enumeration (CWE-78) is not applicable in this case as it refers to abusing functions/input fields not supposed to be accepting OS commands by using 'Special Elements. ** Unsettled ** This issue has not been confirmed as a vulnerability. Meinberg Lantime M300 and M1000 Devices include: OS A command injection vulnerability exists. Vendors are challenging this vulnerability. See below for details NVD of Current Description Please Confirm. https://nvd.nist.gov/vuln/detail/CVE-2020-7240Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Meinberg Funkuhren Lantime M300 and Meinberg Funkuhren Lantime M1000 are both rack-mounted time servers of the German company Meinberg Funkuhren.
There are security holes in Meinberg Funkuhren Lantime M300 and Meinberg Funkuhren Lantime M1000
VAR-202002-0578 | CVE-2020-1812 | HUAWEI P30 Authentication vulnerabilities in smartphones |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
HUAWEI P30 smartphones with versions earlier than 10.0.0.173(C00E73R1P11) have an improper authentication vulnerability. Due to improperly validation of certain application, an attacker should trick the user into installing a malicious application to exploit this vulnerability. Successful exploit could allow the attacker to bypass the authentication to perform unauthorized operations. HUAWEI P30 Smartphones contain authentication vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. The Huawei P30 is a smartphone from China's Huawei
VAR-202002-0613 | CVE-2020-1853 | GaussDB 200 Past Traversal Vulnerability in |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
GaussDB 200 with version of 6.5.1 have a path traversal vulnerability. Due to insufficient input path validation, an authenticated attacker can traverse directories and download files to a specific directory. Successful exploit may cause information leakage. GaussDB 200 Exists in a past traversal vulnerability.Information may be obtained. Huawei GaussDB 200 is a distributed parallel relational database system developed by China Huawei (Huawei) based on the open source database Postgres-XC
VAR-202002-0577 | CVE-2020-1811 | GaussDB 200 Injection vulnerabilities in |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
GaussDB 200 with version of 6.5.1 have a command injection vulnerability. Due to insufficient input validation, remote attackers with low permissions could exploit this vulnerability by sending crafted commands to the affected device. Successful exploit could allow an attacker to execute commands. GaussDB 200 There is an injection vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Huawei GaussDB 200 is a distributed parallel relational database system developed by China Huawei (Huawei) based on the open source database Postgres-XC
VAR-202001-1986 | No CVE | Eastland Technology KGW3101 Serial Port Server Denial of Service Vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Beijing Dongtu Technology Co., Ltd. is a company focusing on industrial Internet technology and industry.
There is a denial of service vulnerability in the Dongtu Technology KGW3101 serial server. An attacker can use this vulnerability to cause the device's web process to restart.
VAR-202001-1979 | No CVE | Seagate Central Storage Remote Code Execution Vulnerability |
CVSS V2: 6.0 CVSS V3: - Severity: MEDIUM |
Seagate Central Storage is a home network hard drive made by Seagate, suitable for home and small office use.
Seagate Central Storage has a remote code execution vulnerability that could be exploited by an attacker to execute code.
VAR-202001-1780 | CVE-2020-7235 | UHP UHP-100 Cross-site scripting vulnerability in devices |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
UHP UHP-100 3.4.1.15, 3.4.2.4, and 3.4.3 devices allow XSS via cB3?ta= (profile title). UHP UHP-100 The device contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified. UHP-100 is a high-performance router designed for large-scale deployment in broadband VSAT networks.
UHP-100 3.4.1.15, 3.4.2.4, 3.4.3 have cross-site scripting vulnerabilities. The vulnerability stems from the lack of proper validation of client data by web applications. An attacker could use this vulnerability to execute client code
VAR-202001-1776 | CVE-2020-7231 | Evoko Home Vulnerabilities in information disclosure through error messages |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
Evoko Home 1.31 devices provide different error messages for failed login requests depending on whether the username is valid. Evoko Home Contains an information disclosure vulnerability through error messages.Information may be obtained
VAR-202001-1781 | CVE-2020-7236 | UHP UHP-100 Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
UHP UHP-100 3.4.1.15, 3.4.2.4, and 3.4.3 devices allow XSS via cw2?td= (Site Name field of the Site Setup section). UHP UHP-100 The device contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified. UHP-100 is a high-performance router designed for large-scale deployment in broadband VSAT networks.
UHP UHP-100 Cross-site scripting vulnerabilities exist in versions 3.4.1.15, 3.4.2.4, and 3.4.3. The vulnerability stems from the lack of proper verification of client data by web applications. Attackers can use this vulnerability to execute client code
VAR-202001-1779 | CVE-2020-7234 | Ruckus ZoneFlex R310 Cross-Site Scripting Vulnerability |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
Ruckus ZoneFlex R310 104.0.0.0.1347 devices allow Stored XSS via the SSID field on the Configuration > Radio 2.4G > Wireless X screen (after a successful login to the super account). Ruckus ZoneFlex The device contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified. Ruckus ZoneFlex R310 is an indoor 802.11ac Wi-Fi access point. The vulnerability stems from the lack of proper verification of client data by web applications. Attackers can use this vulnerability to execute client code
VAR-202001-1777 | CVE-2020-7232 | Evoko Home Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Evoko Home devices 1.31 through 1.37 allow remote attackers to obtain sensitive information (such as usernames and password hashes) via a WebSocket request, as demonstrated by the sockjs/224/uf1psgff/websocket URI at a wss:// URL. Evoko Home The device contains an information disclosure vulnerability.Information may be obtained. Evoko Home is a smart home device.
There are security vulnerabilities in Evoko Home version 1.31
VAR-202001-1958 | No CVE | DIGI PortServer TS 1 TCP Protocol Denial of Service Vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
PortServer TS series terminal server can provide simple, reliable and cost-effective serial network connection.
A denial of service vulnerability exists in the DIGI PortServer TS 1 TCP protocol. An attacker could use the vulnerability to launch a denial of service attack.
VAR-202001-1773 | CVE-2020-7227 | Westermo MRD-315 Information Disclosure Vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, backup.asp, sys-power.asp, ifaces-wls.asp, ifaces-wls-pkt.asp, and ifaces-wls-pkt-adv.asp. Westermo MRD-315 The device contains an information disclosure vulnerability.Information may be obtained. Westermo MRD-315 is a 3G wireless router from Westermo, Sweden. The vulnerability stems from configuration errors in the network system or product during operation. An attacker could use the vulnerability to obtain sensitive information about the affected components
VAR-202001-1713 | CVE-2020-6862 | F6x2W Information disclosure vulnerabilities in products |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
V6.0.10P2T2 and V6.0.10P2T5 of F6x2W product are impacted by Information leak vulnerability. Unauthorized users could log in directly to obtain page information without entering a verification code. ZTE Router is a wireless router equipment of ZTE Corporation. Unauthorized attackers can use vulnerabilities to obtain sensitive information about affected components
VAR-202001-0486 | CVE-2019-14613 | Windows for Intel(R) VTune(TM) Amplifier Vulnerabilities in permissions management |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Improper access control in driver for Intel(R) VTune(TM) Amplifier for Windows* before update 8 may allow an authenticated user to potentially enable escalation of privilege via local access. Windows for Intel(R) VTune(TM) Amplifier Contains a privilege management vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. A local attacker could exploit this vulnerability to elevate privileges
VAR-202001-0485 | CVE-2019-14601 | Windows for Intel(R) RWC 3 Inadequate default permissions vulnerability |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Improper permissions in the installer for Intel(R) RWC 3 for Windows before version 7.010.009.000 may allow an authenticated user to potentially enable escalation of privilege via local access. Windows for Intel(R) RWC 3 Contains an improper default permissions vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. There is a security vulnerability in the installer of Windows-based Intel RWC 3 versions earlier than 7.010.009.000. A local attacker could exploit this vulnerability to elevate privileges
VAR-202001-0484 | CVE-2019-14600 | Windows for Intel(R) SNMP Subagent Stand-Alone Vulnerable to uncontrolled search path elements |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Uncontrolled search path element in the installer for Intel(R) SNMP Subagent Stand-Alone for Windows* may allow an authenticated user to potentially enable escalation of privilege via local access. Intel SNMP Subagent Stand-Alone is an agent program of Intel Corporation for remote management of Intel devices. There is a security vulnerability in the installer of Intel SNMP Subagent Stand-Alone based on Windows platform. A local attacker could exploit this vulnerability to elevate privileges
VAR-202001-0473 | CVE-2019-14629 | Intel(R) DAAL Information Disclosure Vulnerability |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Improper permissions in Intel(R) DAAL before version 2020 Gold may allow an authenticated user to potentially enable information disclosure via local access. Intel(R) DAAL Contains an information disclosure vulnerability.Information may be obtained. A security vulnerability exists in versions prior to Intel DAAL 2020 Gold. A local attacker could exploit this vulnerability to obtain information
VAR-202001-1870 | CVE-2020-5398 | Spring Framework Vulnerabilities in the integrity of downloaded code |
CVSS V2: 7.6 CVSS V3: 7.5 Severity: HIGH |
In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute is derived from user supplied input. Spring Framework Contains a vulnerability in the integrity verification of downloaded code.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Pivotal Software Spring Framework is a set of open source Java and JavaEE application frameworks from Pivotal Software in the United States. The framework helps developers build high-quality applications. A cross-site scripting vulnerability exists in Pivotal Software Spring Framework 5.2.x prior to 5.2.3, 5.1.x prior to 5.1.13, and 5.0.x prior to 5.0.16. A remote attacker could exploit this vulnerability to obtain sensitive information by conducting a Reflected File Download (RFD) attack. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: Red Hat Fuse 7.8.0 release and security update
Advisory ID: RHSA-2020:5568-01
Product: Red Hat JBoss Fuse
Advisory URL: https://access.redhat.com/errata/RHSA-2020:5568
Issue date: 2020-12-16
CVE Names: CVE-2018-1000873 CVE-2019-0205 CVE-2019-0210
CVE-2019-2692 CVE-2019-3773 CVE-2019-3774
CVE-2019-10202 CVE-2019-10219 CVE-2019-11777
CVE-2019-12406 CVE-2019-12423 CVE-2019-13990
CVE-2019-14900 CVE-2019-17566 CVE-2019-17638
CVE-2019-19343 CVE-2020-1714 CVE-2020-1719
CVE-2020-1950 CVE-2020-1960 CVE-2020-5398
CVE-2020-7226 CVE-2020-9488 CVE-2020-9489
CVE-2020-10683 CVE-2020-10740 CVE-2020-11612
CVE-2020-11971 CVE-2020-11972 CVE-2020-11973
CVE-2020-11980 CVE-2020-11989 CVE-2020-11994
CVE-2020-13692 CVE-2020-13933 CVE-2020-14326
====================================================================
1. Summary:
A minor version update (from 7.7 to 7.8) is now available for Red Hat Fuse.
The purpose of this text-only errata is to inform you about the security
issues fixed in this release.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Description:
This release of Red Hat Fuse 7.8.0 serves as a replacement for Red Hat Fuse
7.7, and includes bug fixes and enhancements, which are documented in the
Release Notes document linked to in the References.
Security Fix(es):
* libquartz: XXE attacks via job description (CVE-2019-13990)
* jetty: double release of resource can lead to information disclosure
(CVE-2019-17638)
* keycloak: Lack of checks in ObjectInputStream leading to Remote Code
Execution (CVE-2020-1714)
* springframework: RFD attack via Content-Disposition Header sourced from
request input by Spring MVC or Spring WebFlux Application (CVE-2020-5398)
* wildfly: unsafe deserialization in Wildfly Enterprise Java Beans
(CVE-2020-10740)
* camel: RabbitMQ enables Java deserialization by default which could leed
to remote code execution (CVE-2020-11972)
* camel: Netty enables Java deserialization by default which could leed to
remote code execution (CVE-2020-11973)
* shiro: spring dynamic controllers, a specially crafted request may cause
an authentication bypass (CVE-2020-11989)
* camel: server-side template injection and arbitrary file disclosure on
templating components (CVE-2020-11994)
* postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML
(CVE-2020-13692)
* shiro: specially crafted HTTP request may cause an authentication bypass
(CVE-2020-13933)
* RESTEasy: Caching routes in RootNode may result in DoS (CVE-2020-14326)
* jackson-modules-java8: DoS due to an Improper Input Validation
(CVE-2018-1000873)
* thrift: Endless loop when feed with specific input data (CVE-2019-0205)
* thrift: Out-of-bounds read related to TJSONProtocol or
TSimpleJSONProtocol (CVE-2019-0210)
* mysql-connector-java: privilege escalation in MySQL connector
(CVE-2019-2692)
* spring-ws: XML External Entity Injection (XXE) when receiving XML data
from untrusted sources (CVE-2019-3773)
* spring-batch: XML External Entity Injection (XXE) when receiving XML data
from untrusted sources (CVE-2019-3774)
* codehaus: incomplete fix for unsafe deserialization in jackson-databind
vulnerabilities (CVE-2019-10202)
* hibernate-validator: safeHTML validator allows XSS (CVE-2019-10219)
* org.eclipse.paho.client.mqttv3: Improper hostname validation in the MQTT
library (CVE-2019-11777)
* cxf: does not restrict the number of message attachments (CVE-2019-12406)
* cxf: OpenId Connect token service does not properly validate the clientId
(CVE-2019-12423)
* hibernate: SQL injection issue in Hibernate ORM (CVE-2019-14900)
* batik: SSRF via "xlink:href" (CVE-2019-17566)
* Undertow: Memory Leak in Undertow HttpOpenListener due to holding
remoting connections indefinitely (CVE-2019-19343)
* Wildfly: EJBContext principal is not popped back after invoking another
EJB using a different Security Domain (CVE-2020-1719)
* apache-flink: JMX information disclosure vulnerability (CVE-2020-1960)
* cryptacular: excessive memory allocation during a decode operation
(CVE-2020-7226)
* tika-core: Denial of Service Vulnerabilities in Some of Apache Tika's
Parsers (CVE-2020-9489)
* dom4j: XML External Entity vulnerability in default SAX parser
(CVE-2020-10683)
* netty: compression/decompression codecs don't enforce limits on buffer
allocation sizes (CVE-2020-11612)
* camel: DNS Rebinding in JMX Connector could result in remote command
execution (CVE-2020-11971)
* karaf: A remote client could create MBeans from arbitrary URLs
(CVE-2020-11980)
* tika: excessive memory usage in PSDParser (CVE-2020-1950)
* log4j: improper validation of certificate with host mismatch in SMTP
appender (CVE-2020-9488)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
3. Solution:
Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.
Installation instructions are available from the Fuse 7.8.0 product
documentation page:
https://access.redhat.com/documentation/en-us/red_hat_fuse/7.8/
4. Bugs fixed (https://bugzilla.redhat.com/):
1665601 - CVE-2018-1000873 jackson-modules-java8: DoS due to an Improper Input Validation
1666499 - CVE-2019-14900 hibernate: SQL injection issue in Hibernate ORM
1670593 - CVE-2019-3773 spring-ws: XML External Entity Injection (XXE) when receiving XML data from untrusted sources
1670597 - CVE-2019-3774 spring-batch: XML External Entity Injection (XXE) when receiving XML data from untrusted sources
1694235 - CVE-2020-10683 dom4j: XML External Entity vulnerability in default SAX parser
1703402 - CVE-2019-2692 mysql-connector-java: privilege escalation in MySQL connector
1705975 - CVE-2020-1714 keycloak: Lack of checks in ObjectInputStream leading to Remote Code Execution
1731271 - CVE-2019-10202 codehaus: incomplete fix for unsafe deserialization in jackson-databind vulnerabilities
1738673 - CVE-2019-10219 hibernate-validator: safeHTML validator allows XSS
1764607 - CVE-2019-0210 thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol
1764612 - CVE-2019-0205 thrift: Endless loop when feed with specific input data
1780445 - CVE-2019-19343 Undertow: Memory Leak in Undertow HttpOpenListener due to holding remoting connections indefinitely
1796617 - CVE-2020-1719 Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain
1797006 - CVE-2019-12423 cxf: OpenId Connect token service does not properly validate the clientId
1799475 - CVE-2020-5398 springframework: RFD attack via Content-Disposition Header sourced from request input by Spring MVC or Spring WebFlux Application
1801149 - CVE-2019-13990 libquartz: XXE attacks via job description
1801380 - CVE-2020-7226 cryptacular: excessive memory allocation during a decode operation
1816170 - CVE-2019-12406 cxf: does not restrict the number of message attachments
1816216 - CVE-2020-11612 netty: compression/decompression codecs don't enforce limits on buffer allocation sizes
1822759 - CVE-2020-1950 tika: excessive memory usage in PSDParser
1831139 - CVE-2020-9488 log4j: improper validation of certificate with host mismatch in SMTP appender
1834512 - CVE-2020-10740 wildfly: unsafe deserialization in Wildfly Enterprise Java Beans
1848126 - CVE-2020-1960 apache-flink: JMX information disclosure vulnerability
1848433 - CVE-2020-11971 camel: DNS Rebinding in JMX Connector could result in remote command execution
1848464 - CVE-2020-11972 camel: RabbitMQ enables Java deserialization by default which could leed to remote code execution
1848465 - CVE-2020-11973 camel: Netty enables Java deserialization by default which could leed to remote code execution
1848617 - CVE-2019-17566 batik: SSRF via "xlink:href"
1850042 - CVE-2020-9489 tika-core: Denial of Service Vulnerabilities in Some of Apache Tika's Parsers
1850069 - CVE-2020-11989 shiro: spring dynamic controllers, a specially crafted request may cause an authentication bypass
1850450 - CVE-2020-11980 karaf: A remote client could create MBeans from arbitrary URLs
1852985 - CVE-2020-13692 postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML
1855786 - CVE-2020-11994 camel: server-side template injection and arbitrary file disclosure on templating components
1855826 - CVE-2020-14326 RESTEasy: Caching routes in RootNode may result in DoS
1864680 - CVE-2019-17638 jetty: double release of resource can lead to information disclosure
1869860 - CVE-2020-13933 shiro: specially crafted HTTP request may cause an authentication bypass
1879743 - CVE-2019-11777 org.eclipse.paho.client.mqttv3: Improper hostname validation in the MQTT library
5. References:
https://access.redhat.com/security/cve/CVE-2018-1000873
https://access.redhat.com/security/cve/CVE-2019-0205
https://access.redhat.com/security/cve/CVE-2019-0210
https://access.redhat.com/security/cve/CVE-2019-2692
https://access.redhat.com/security/cve/CVE-2019-3773
https://access.redhat.com/security/cve/CVE-2019-3774
https://access.redhat.com/security/cve/CVE-2019-10202
https://access.redhat.com/security/cve/CVE-2019-10219
https://access.redhat.com/security/cve/CVE-2019-11777
https://access.redhat.com/security/cve/CVE-2019-12406
https://access.redhat.com/security/cve/CVE-2019-12423
https://access.redhat.com/security/cve/CVE-2019-13990
https://access.redhat.com/security/cve/CVE-2019-14900
https://access.redhat.com/security/cve/CVE-2019-17566
https://access.redhat.com/security/cve/CVE-2019-17638
https://access.redhat.com/security/cve/CVE-2019-19343
https://access.redhat.com/security/cve/CVE-2020-1714
https://access.redhat.com/security/cve/CVE-2020-1719
https://access.redhat.com/security/cve/CVE-2020-1950
https://access.redhat.com/security/cve/CVE-2020-1960
https://access.redhat.com/security/cve/CVE-2020-5398
https://access.redhat.com/security/cve/CVE-2020-7226
https://access.redhat.com/security/cve/CVE-2020-9488
https://access.redhat.com/security/cve/CVE-2020-9489
https://access.redhat.com/security/cve/CVE-2020-10683
https://access.redhat.com/security/cve/CVE-2020-10740
https://access.redhat.com/security/cve/CVE-2020-11612
https://access.redhat.com/security/cve/CVE-2020-11971
https://access.redhat.com/security/cve/CVE-2020-11972
https://access.redhat.com/security/cve/CVE-2020-11973
https://access.redhat.com/security/cve/CVE-2020-11980
https://access.redhat.com/security/cve/CVE-2020-11989
https://access.redhat.com/security/cve/CVE-2020-11994
https://access.redhat.com/security/cve/CVE-2020-13692
https://access.redhat.com/security/cve/CVE-2020-13933
https://access.redhat.com/security/cve/CVE-2020-14326
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=jboss.fuse&version=7.8.0
https://access.redhat.com/documentation/en-us/red_hat_fuse/7.8/
6. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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jGVK
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce