VYPR

rpm package

suse/susemanager-sls&distro=SUSE Manager Server Module 4.2

pkg:rpm/suse/susemanager-sls&distro=SUSE%20Manager%20Server%20Module%204.2

Vulnerabilities (23)

  • CVE-2023-22644Sep 20, 2023
    affected < 4.2.34-150300.3.51.1fixed 4.2.34-150300.3.51.1

    A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE.

  • CVE-2022-1415Sep 11, 2023
    affected < 4.2.31-150300.3.43.1fixed 4.2.31-150300.3.43.1

    A flaw was found where some utility classes in Drools core did not use proper safeguards when deserializing data. This flaw allows an authenticated attacker to construct malicious serialized objects (usually called gadgets) and achieve code execution on the server.

  • CVE-2023-29409Aug 2, 2023
    affected < 4.2.35-150300.3.54.3fixed 4.2.35-150300.3.54.3

    Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are curr

  • CVE-2022-43754Nov 10, 2022
    affected < 4.2.28-150300.3.36.2fixed 4.2.28-150300.3.36.2

    An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in spacewalk/Uyuni of SUSE Linux Enterprise Module for SUSE Manager Server 4.2, SUSE Linux Enterprise Module for SUSE Manager Server 4.3, SUSE Manager Server 4.2 allows remote at

  • CVE-2022-43753Nov 10, 2022
    affected < 4.2.28-150300.3.36.2fixed 4.2.28-150300.3.36.2

    A Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in spacewalk/Uyuni of SUSE Linux Enterprise Module for SUSE Manager Server 4.2, SUSE Linux Enterprise Module for SUSE Manager Server 4.3, SUSE Manager Server 4.2 allows remote attackers

  • CVE-2022-31255Nov 10, 2022
    affected < 4.2.28-150300.3.36.2fixed 4.2.28-150300.3.36.2

    An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in spacewalk/Uyuni of SUSE Linux Enterprise Module for SUSE Manager Server 4.2, SUSE Linux Enterprise Module for SUSE Manager Server 4.3, SUSE Manager Server 4.2 allows remote attacker

  • CVE-2022-40152Sep 16, 2022
    affected < 4.2.31-150300.3.43.1fixed 4.2.31-150300.3.43.1

    Those using Woodstox to parse XML data may be vulnerable to Denial of Service attacks (DOS) if DTD support is enabled. If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denia

  • CVE-2022-31129Jul 6, 2022
    affected < 4.2.27-150300.3.33.4fixed 4.2.27-150300.3.33.4

    moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried

  • CVE-2022-31248Jun 22, 2022
    affected < 4.2.23-150300.3.25.4fixed 4.2.23-150300.3.25.4

    A Observable Response Discrepancy vulnerability in spacewalk-java of SUSE Manager Server 4.1, SUSE Manager Server 4.2 allows remote attackers to discover valid usernames. This issue affects: SUSE Manager Server 4.1 spacewalk-java versions prior to 4.1.46-1. SUSE Manager Server 4.

  • CVE-2022-21952Jun 22, 2022
    affected < 4.2.23-150300.3.25.4fixed 4.2.23-150300.3.25.4

    A Missing Authentication for Critical Function vulnerability in spacewalk-java of SUSE Manager Server 4.1, SUSE Manager Server 4.2 allows remote attackers to easily exhaust available disk resources leading to DoS. This issue affects: SUSE Manager Server 4.1 spacewalk-java version

  • CVE-2021-41411Jun 16, 2022
    affected < 4.2.27-150300.3.33.4fixed 4.2.27-150300.3.33.4

    drools <=7.59.x is affected by an XML External Entity (XXE) vulnerability in KieModuleMarshaller.java. The Validator class is not used correctly, resulting in the XXE injection vulnerability.

  • CVE-2021-43138Apr 6, 2022
    affected < 4.2.27-150300.3.33.4fixed 4.2.27-150300.3.33.4

    In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.

  • CVE-2021-44906Mar 17, 2022
    affected < 4.2.23-150300.3.25.4fixed 4.2.23-150300.3.25.4

    Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).

  • CVE-2022-0860Mar 11, 2022
    affected < 4.2.31-150300.3.43.1fixed 4.2.31-150300.3.43.1

    Improper Authorization in GitHub repository cobbler/cobbler prior to 3.3.2.

  • CVE-2021-40348Nov 1, 2021
    affected < 4.2.18-3.11.1fixed 4.2.18-3.11.1

    Spacewalk 2.10, and derivatives such as Uyuni 2021.08, allows code injection. rhn-config-satellite.pl doesn't sanitize the configuration filename used to append Spacewalk-specific key-value pair. The script is intended to be run by the tomcat user account with Sudo, according to

  • CVE-2021-42740Oct 21, 2021
    affected < 4.2.27-150300.3.33.4fixed 4.2.27-150300.3.33.4

    The shell-quote package before 1.7.3 for Node.js allows command injection. An attacker can inject unescaped shell metacharacters through a regex designed to support Windows drive letters. If the output of this package is passed to a real shell as a quoted argument to a command wi

  • CVE-2021-40325Oct 4, 2021
    affected < 4.2.16-3.6.1fixed 4.2.16-3.6.1

    Cobbler before 3.3.0 allows authorization bypass for modification of settings.

  • CVE-2021-40324Oct 4, 2021
    affected < 4.2.16-3.6.1fixed 4.2.16-3.6.1

    Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data.

  • CVE-2021-40323Oct 4, 2021
    affected < 4.2.16-3.6.1fixed 4.2.16-3.6.1

    Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.

  • CVE-2021-21996Sep 8, 2021
    affected < 4.2.18-3.11.1fixed 4.2.18-3.11.1

    An issue was discovered in SaltStack Salt before 3003.3. A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion.

Page 1 of 2