VYPR

rpm package

suse/spacewalk-certs-tools&distro=SUSE Manager Server Module 4.2

pkg:rpm/suse/spacewalk-certs-tools&distro=SUSE%20Manager%20Server%20Module%204.2

Vulnerabilities (18)

  • CVE-2023-22644Sep 20, 2023
    affected < 4.2.20-150300.3.30.4fixed 4.2.20-150300.3.30.4

    A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE.

  • CVE-2022-1415Sep 11, 2023
    affected < 4.2.19-150300.3.27.4fixed 4.2.19-150300.3.27.4

    A flaw was found where some utility classes in Drools core did not use proper safeguards when deserializing data. This flaw allows an authenticated attacker to construct malicious serialized objects (usually called gadgets) and achieve code execution on the server.

  • CVE-2022-40152Sep 16, 2022
    affected < 4.2.19-150300.3.27.4fixed 4.2.19-150300.3.27.4

    Those using Woodstox to parse XML data may be vulnerable to Denial of Service attacks (DOS) if DTD support is enabled. If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denia

  • CVE-2022-31129Jul 6, 2022
    affected < 4.2.18-150300.3.24.3fixed 4.2.18-150300.3.24.3

    moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried

  • CVE-2022-31248Jun 22, 2022
    affected < 4.2.16-150300.3.18.3fixed 4.2.16-150300.3.18.3

    A Observable Response Discrepancy vulnerability in spacewalk-java of SUSE Manager Server 4.1, SUSE Manager Server 4.2 allows remote attackers to discover valid usernames. This issue affects: SUSE Manager Server 4.1 spacewalk-java versions prior to 4.1.46-1. SUSE Manager Server 4.

  • CVE-2022-21952Jun 22, 2022
    affected < 4.2.16-150300.3.18.3fixed 4.2.16-150300.3.18.3

    A Missing Authentication for Critical Function vulnerability in spacewalk-java of SUSE Manager Server 4.1, SUSE Manager Server 4.2 allows remote attackers to easily exhaust available disk resources leading to DoS. This issue affects: SUSE Manager Server 4.1 spacewalk-java version

  • CVE-2021-41411Jun 16, 2022
    affected < 4.2.18-150300.3.24.3fixed 4.2.18-150300.3.24.3

    drools <=7.59.x is affected by an XML External Entity (XXE) vulnerability in KieModuleMarshaller.java. The Validator class is not used correctly, resulting in the XXE injection vulnerability.

  • CVE-2021-43138Apr 6, 2022
    affected < 4.2.18-150300.3.24.3fixed 4.2.18-150300.3.24.3

    In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.

  • CVE-2021-44906Mar 17, 2022
    affected < 4.2.16-150300.3.18.3fixed 4.2.16-150300.3.18.3

    Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).

  • CVE-2022-0860Mar 11, 2022
    affected < 4.2.19-150300.3.27.4fixed 4.2.19-150300.3.27.4

    Improper Authorization in GitHub repository cobbler/cobbler prior to 3.3.2.

  • CVE-2021-40348Nov 1, 2021
    affected < 4.2.13-3.9.2fixed 4.2.13-3.9.2

    Spacewalk 2.10, and derivatives such as Uyuni 2021.08, allows code injection. rhn-config-satellite.pl doesn't sanitize the configuration filename used to append Spacewalk-specific key-value pair. The script is intended to be run by the tomcat user account with Sudo, according to

  • CVE-2021-42740Oct 21, 2021
    affected < 4.2.18-150300.3.24.3fixed 4.2.18-150300.3.24.3

    The shell-quote package before 1.7.3 for Node.js allows command injection. An attacker can inject unescaped shell metacharacters through a regex designed to support Windows drive letters. If the output of this package is passed to a real shell as a quoted argument to a command wi

  • CVE-2021-40325Oct 4, 2021
    affected < 4.2.12-3.6.2fixed 4.2.12-3.6.2

    Cobbler before 3.3.0 allows authorization bypass for modification of settings.

  • CVE-2021-40324Oct 4, 2021
    affected < 4.2.12-3.6.2fixed 4.2.12-3.6.2

    Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data.

  • CVE-2021-40323Oct 4, 2021
    affected < 4.2.12-3.6.2fixed 4.2.12-3.6.2

    Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.

  • CVE-2021-21996Sep 8, 2021
    affected < 4.2.13-3.9.2fixed 4.2.13-3.9.2

    An issue was discovered in SaltStack Salt before 3003.3. A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion.

  • CVE-2019-5427Apr 22, 2019
    affected < 4.2.15-150300.3.15.1fixed 4.2.15-150300.3.15.1

    c3p0 version < 0.9.5.4 may be exploited by a billion laughs attack when loading XML configuration due to missing protections against recursive entity expansion when loading configuration.

  • CVE-2018-20433Dec 24, 2018
    affected < 4.2.15-150300.3.15.1fixed 4.2.15-150300.3.15.1

    c3p0 0.9.5.2 allows XXE in extractXmlConfigFromInputStream in com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java during initialization.