rpm package
suse/uyuni-tools&distro=SUSE Manager Client Tools 15
pkg:rpm/suse/uyuni-tools&distro=SUSE%20Manager%20Client%20Tools%2015
Vulnerabilities (23)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-45142 | — | < 0.1.21-150000.1.8.2 | 0.1.21-150000.1.8.2 | Oct 12, 2023 | OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. A handler wrapper out of the box adds labels `http.user_agent` and `http.method` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests | ||
| CVE-2023-3978 | — | < 0.1.23-150000.1.13.3 | 0.1.23-150000.1.13.3 | Aug 2, 2023 | Text nodes not in the HTML namespace are incorrectly literally rendered, causing text which should be escaped to not be. This could lead to an XSS attack. | ||
| CVE-2023-3128 | — | < 0.1.28-150000.1.16.1 | 0.1.28-150000.1.16.1 | Jun 22, 2023 | Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app. |
- CVE-2023-45142Oct 12, 2023affected < 0.1.21-150000.1.8.2fixed 0.1.21-150000.1.8.2
OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. A handler wrapper out of the box adds labels `http.user_agent` and `http.method` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests
- CVE-2023-3978Aug 2, 2023affected < 0.1.23-150000.1.13.3fixed 0.1.23-150000.1.13.3
Text nodes not in the HTML namespace are incorrectly literally rendered, causing text which should be escaped to not be. This could lead to an XSS attack.
- CVE-2023-3128Jun 22, 2023affected < 0.1.28-150000.1.16.1fixed 0.1.28-150000.1.16.1
Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.
Page 2 of 2