rpm package
suse/spacewalk-search&distro=SUSE Manager Server 3.1
pkg:rpm/suse/spacewalk-search&distro=SUSE%20Manager%20Server%203.1
Vulnerabilities (7)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2017-7538 | — | < 2.7.3.2-2.3.4 | 2.7.3.2-2.3.4 | Jul 26, 2018 | A cross-site scripting (XSS) flaw was found in how an organization name is displayed in Satellite 5, before 5.8. A user able to change an organization's name could exploit this flaw to perform XSS attacks against other Satellite users. | ||
| CVE-2017-5754 | — | < 2.7.3.4-2.9.7 | 2.7.3.4-2.9.7 | Jan 4, 2018 | Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache. | ||
| CVE-2017-5753 | — | < 2.7.3.4-2.9.7 | 2.7.3.4-2.9.7 | Jan 4, 2018 | Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. | ||
| CVE-2017-5715 | — | < 2.7.3.4-2.9.7 | 2.7.3.4-2.9.7 | Jan 4, 2018 | Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. | ||
| CVE-2017-14696 | Hig | 7.5 | < 2.7.3.6-2.16.1 | 2.7.3.6-2.16.1 | Oct 24, 2017 | SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote attackers to cause a denial of service via a crafted authentication request. | |
| CVE-2017-14695 | Cri | 9.8 | < 2.7.3.6-2.16.1 | 2.7.3.6-2.16.1 | Oct 24, 2017 | Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID. NOTE: this vulnerability ex | |
| CVE-2017-10807 | Cri | 9.8 | < 2.7.3.2-2.3.4 | 2.7.3.2-2.3.4 | Jul 4, 2017 | JabberD 2.x (aka jabberd2) before 2.6.1 allows anyone to authenticate using SASL ANONYMOUS, even when the sasl.anonymous c2s.xml option is not enabled. |
- CVE-2017-7538Jul 26, 2018affected < 2.7.3.2-2.3.4fixed 2.7.3.2-2.3.4
A cross-site scripting (XSS) flaw was found in how an organization name is displayed in Satellite 5, before 5.8. A user able to change an organization's name could exploit this flaw to perform XSS attacks against other Satellite users.
- CVE-2017-5754Jan 4, 2018affected < 2.7.3.4-2.9.7fixed 2.7.3.4-2.9.7
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
- CVE-2017-5753Jan 4, 2018affected < 2.7.3.4-2.9.7fixed 2.7.3.4-2.9.7
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
- CVE-2017-5715Jan 4, 2018affected < 2.7.3.4-2.9.7fixed 2.7.3.4-2.9.7
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
- affected < 2.7.3.6-2.16.1fixed 2.7.3.6-2.16.1
SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote attackers to cause a denial of service via a crafted authentication request.
- affected < 2.7.3.6-2.16.1fixed 2.7.3.6-2.16.1
Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID. NOTE: this vulnerability ex
- affected < 2.7.3.2-2.3.4fixed 2.7.3.2-2.3.4
JabberD 2.x (aka jabberd2) before 2.6.1 allows anyone to authenticate using SASL ANONYMOUS, even when the sasl.anonymous c2s.xml option is not enabled.