VYPR

rpm package

suse/golang-github-prometheus-node_exporter&distro=SUSE Manager Client Tools for SLE Micro 5

pkg:rpm/suse/golang-github-prometheus-node_exporter&distro=SUSE%20Manager%20Client%20Tools%20for%20SLE%20Micro%205

Vulnerabilities (11)

  • CVE-2026-1615CriFeb 9, 2026
    affected < 1.9.1-150100.3.38.1fixed 1.9.1-150100.3.38.1

    Versions of the package jsonpath before 1.3.0 are vulnerable to Arbitrary Code Injection via unsafe evaluation of user-supplied JSON Path expressions. The library relies on the static-eval module to process JSON Path input, which is not designed to handle untrusted data safely. A

  • CVE-2026-25547CriFeb 4, 2026
    affected < 1.9.1-150100.3.38.1fixed 1.9.1-150100.3.38.1

    @isaacs/brace-expansion is a hybrid CJS/ESM TypeScript fork of brace-expansion. Prior to version 5.0.1, @isaacs/brace-expansion is vulnerable to a denial of service (DoS) issue caused by unbounded brace range expansion. When an attacker provides a pattern containing repeated nume

  • CVE-2025-61140Jan 28, 2026
    affected < 1.9.1-150100.3.38.1fixed 1.9.1-150100.3.38.1

    The value function in jsonpath 1.1.1 lib/index.js is vulnerable to Prototype Pollution.

  • CVE-2025-13465Jan 21, 2026
    affected < 1.9.1-150100.3.38.1fixed 1.9.1-150100.3.38.1

    Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes. The issue permits deletion of properties but does not allow overwritin

  • CVE-2025-12816Nov 25, 2025
    affected < 1.9.1-150100.3.38.1fixed 1.9.1-150100.3.38.1

    An interpretation-conflict (CWE-436) vulnerability in node-forge versions 1.3.1 and earlier enables unauthenticated attackers to craft ASN.1 structures to desynchronize schema validations, yielding a semantic divergence that may bypass downstream cryptographic verifications and s

  • CVE-2025-22870MedMar 12, 2025
    affected < 1.9.1-150100.3.35.2fixed 1.9.1-150100.3.35.2

    Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

  • CVE-2023-45288HigApr 4, 2024
    affected < 1.9.1-150100.3.35.2fixed 1.9.1-150100.3.35.2

    An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed Ma

  • CVE-2023-29409Aug 2, 2023
    affected < 1.5.0-150100.3.26.2fixed 1.5.0-150100.3.26.2

    Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are curr

  • CVE-2022-46146Nov 29, 2022
    affected < 1.5.0-150100.3.23.2fixed 1.5.0-150100.3.23.2

    Prometheus Exporter Toolkit is a utility package to build exporters. Prior to versions 0.7.2 and 0.8.2, if someone has access to a Prometheus web.yml file and users' bcrypted passwords, they can bypass security by poisoning the built-in authentication cache. Versions 0.7.2 and 0.

  • CVE-2022-27664Sep 6, 2022
    affected < 1.5.0-150100.3.23.2fixed 1.5.0-150100.3.23.2

    In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.

  • CVE-2022-27191Mar 18, 2022
    affected < 1.5.0-150100.3.23.2fixed 1.5.0-150100.3.23.2

    The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.