Redhat

Satellite

225 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 02.02.2026 05:47:10
  • Zuletzt bearbeitet 03.02.2026 16:44:36

A flaw was found in fog-kubevirt. This vulnerability allows a remote attacker to perform a Man-in-the-Middle (MITM) attack due to disabled certificate validation. This enables the attacker to intercept and potentially alter sensitive communications b...

  • EPSS 0.02%
  • Veröffentlicht 02.02.2026 05:47:09
  • Zuletzt bearbeitet 03.02.2026 16:44:36

A flaw was found in foreman_kubevirt. When configuring the connection to OpenShift, the system disables SSL verification if a Certificate Authority (CA) certificate is not explicitly set. This insecure default allows a remote attacker, capable of int...

  • EPSS 0.07%
  • Veröffentlicht 06.11.2025 21:15:40
  • Zuletzt bearbeitet 12.11.2025 16:20:22

A flaw was found in Rubygem MQTT. By default, the package used to not have hostname validation, resulting in possible Man-in-the-Middle (MITM) attack.

  • EPSS 0.13%
  • Veröffentlicht 05.11.2025 07:32:14
  • Zuletzt bearbeitet 23.12.2025 23:15:43

A flaw was found in Red Hat Satellite (Foreman component). This vulnerability allows an authenticated user with edit_settings permissions to achieve arbitrary command execution on the underlying operating system via insufficient server-side validatio...

  • EPSS 0.03%
  • Veröffentlicht 15.03.2025 06:35:52
  • Zuletzt bearbeitet 15.03.2025 07:15:34

A flaw was found in Foreman/Red Hat Satellite. Improper file permissions allow low-privileged OS users to monitor and access temporary files under /var/tmp, exposing sensitive command outputs, such as /etc/shadow. This issue can lead to information d...

  • EPSS 0.06%
  • Veröffentlicht 20.12.2024 16:15:23
  • Zuletzt bearbeitet 12.05.2025 21:15:46

Rejected reason: Red Hat Product Security has come to the conclusion that this CVE is not needed. The problem described was inteded behavior and therefore not a bug.

  • EPSS 0.17%
  • Veröffentlicht 04.09.2024 14:15:14
  • Zuletzt bearbeitet 06.11.2024 09:15:04

An authentication bypass vulnerability has been identified in Foreman when deployed with External Authentication, due to the puppet-foreman configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restriction...

  • EPSS 0.31%
  • Veröffentlicht 04.09.2024 14:15:14
  • Zuletzt bearbeitet 24.11.2024 19:15:05

An authentication bypass vulnerability has been identified in Pulpcore when deployed with Gunicorn versions prior to 22.0, due to the puppet-pulpcore configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of r...

  • EPSS 0.08%
  • Veröffentlicht 05.06.2024 15:15:12
  • Zuletzt bearbeitet 21.11.2024 09:30:13

A flaw was found in foreman-installer when puppet-candlepin is invoked cpdb with the --password parameter. This issue leaks the password in the process list and allows an attacker to take advantage and obtain the password.

  • EPSS 0.11%
  • Veröffentlicht 05.06.2024 15:15:12
  • Zuletzt bearbeitet 21.11.2024 09:43:40

A flaw was found in the Katello plugin for Foreman, where it is possible to store malicious JavaScript code in the "Description" field of a user. This code can be executed when opening certain pages, for example, Host Collections.