VYPR

rpm package

suse/release-notes-susemanager&distro=SUSE Manager Server 4.3

pkg:rpm/suse/release-notes-susemanager&distro=SUSE%20Manager%20Server%204.3

Vulnerabilities (49)

  • CVE-2025-22870MedMar 12, 2025
    affected < 4.3.15.2-150400.3.133.1fixed 4.3.15.2-150400.3.133.1

    Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

  • CVE-2025-27144MedFeb 24, 2025
    affected < 4.3.15.2-150400.3.133.1fixed 4.3.15.2-150400.3.133.1

    Go JOSE provides an implementation of the Javascript Object Signing and Encryption set of standards in Go, including support for JSON Web Encryption (JWE), JSON Web Signature (JWS), and JSON Web Token (JWT) standards. In versions on the 4.x branch prior to version 4.0.5, when par

  • CVE-2024-11741MedJan 31, 2025
    affected < 4.3.15.2-150400.3.133.1fixed 4.3.15.2-150400.3.133.1

    Grafana is an open-source platform for monitoring and observability. The Grafana Alerting VictorOps integration was not properly protected and could be exposed to users with Viewer permission. Fixed in versions 11.5.0, 11.4.1, 11.3.3,  11.2.6, 11.1.11, 11.0.11 and 10.4.15

  • CVE-2024-45339HigJan 28, 2025
    affected < 4.3.15.2-150400.3.133.1fixed 4.3.15.2-150400.3.133.1

    When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and

  • CVE-2024-45337CriDec 12, 2024
    affected < 4.3.15.2-150400.3.133.1fixed 4.3.15.2-150400.3.133.1

    Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that "A call to this function does not guarantee that

  • CVE-2024-49503LowNov 28, 2024
    affected < 4.3.14-150400.3.122.1fixed 4.3.14-150400.3.122.1

    A Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in SUSE manager allows attackers to execute Javascript code in the organization credentials sub page. This issue affects Container suse/manager/5.0/x86_64/server:5.0.2.7.8.

  • CVE-2024-49502LowNov 28, 2024
    affected < 4.3.14-150400.3.122.1fixed 4.3.14-150400.3.122.1

    A Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in the Setup Wizard, HTTP Proxy credentials pane in spacewalk-web allows attackers to attack users by providing specially crafted URLs to click. This issue affects Containe

  • CVE-2024-47533CriNov 18, 2024
    affected < 4.3.14-150400.3.122.1fixed 4.3.14-150400.3.122.1

    Cobbler, a Linux installation server that allows for rapid setup of network installation environments, has an improper authentication vulnerability starting in version 3.0.0 and prior to versions 3.2.3 and 3.3.7. `utils.get_shared_secret()` always returns `-1`, which allows anyon

  • CVE-2023-34049MedNov 14, 2024
    affected < 4.3.9-150400.3.90.1fixed 4.3.9-150400.3.90.1

    The Salt-SSH pre-flight option copies the script to the target at a predictable path, which allows an attacker to force Salt-SSH to run their script. If an attacker has access to the target VM and knows the path to the pre-flight script before it runs they can ensure Salt-SSH run

  • CVE-2024-9476MedNov 13, 2024
    affected < 4.3.15.2-150400.3.133.1fixed 4.3.15.2-150400.3.133.1

    A vulnerability in Grafana Labs Grafana OSS and Enterprise allows Privilege Escalation allows users to gain access to resources from other organizations within the same Grafana instance via the Grafana Cloud Migration Assistant.This vulnerability will only affect users who utiliz

  • CVE-2024-47535Nov 12, 2024
    affected < 4.3.15.2-150400.3.133.1fixed 4.3.15.2-150400.3.133.1

    Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application

  • CVE-2024-51744LowNov 4, 2024
    affected < 4.3.15.2-150400.3.133.1fixed 4.3.15.2-150400.3.133.1

    golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors r

  • CVE-2024-9264Oct 18, 2024
    affected < 4.3.15.2-150400.3.133.1fixed 4.3.15.2-150400.3.133.1

    The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user wit

  • CVE-2023-32189MedOct 16, 2024
    affected < 4.3.11-150400.3.100.1fixed 4.3.11-150400.3.100.1

    Insecure handling of ssh keys used to bootstrap clients allows local attackers to potentially gain access to the keys

  • CVE-2024-22232HigJun 27, 2024
    affected < 4.3.11-150400.3.100.1fixed 4.3.11-150400.3.100.1

    A specially crafted url can be created which leads to a directory traversal in the salt file server. A malicious user can read an arbitrary file from a Salt master’s filesystem.

  • CVE-2024-22231MedJun 27, 2024
    affected < 4.3.11-150400.3.100.1fixed 4.3.11-150400.3.100.1

    Syndic cache directory creation is vulnerable to a directory traversal attack in salt project which can lead a malicious attacker to create an arbitrary directory on a Salt master.

  • CVE-2023-45288HigApr 4, 2024
    affected < 4.3.15.2-150400.3.133.1fixed 4.3.15.2-150400.3.133.1

    An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed Ma

  • CVE-2023-51775Dec 25, 2023
    affected < 4.3.12-150400.3.108.2fixed 4.3.12-150400.3.108.2

    The jose4j component before 0.9.4 for Java allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.

  • CVE-2023-22644Sep 20, 2023
    affected < 4.3.6-150400.3.63.2fixed 4.3.6-150400.3.63.2

    A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE.

  • CVE-2022-1415Sep 11, 2023
    affected < 4.3.4-150400.3.43.1fixed 4.3.4-150400.3.43.1

    A flaw was found where some utility classes in Drools core did not use proper safeguards when deserializing data. This flaw allows an authenticated attacker to construct malicious serialized objects (usually called gadgets) and achieve code execution on the server.