Multiple Vulnerabilities in Red Hat Products Allow Remote Code Execution, File Manipulation, and Denial of Service
72% confidence
Description
Multiple vulnerabilities in Red Hat products can be exploited by a remote anonymous attacker to manipulate files, execute arbitrary code, and cause a denial-of-service condition.