Redhat

Satellite

225 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.66%
  • Veröffentlicht 20.08.2018 19:31:31
  • Zuletzt bearbeitet 21.11.2024 03:40:16

dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be explo...

  • EPSS 67.78%
  • Veröffentlicht 09.08.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:20

It was found that cobbler 2.6.x exposed all functions from its CobblerXMLRPCInterface class over XMLRPC. A remote, unauthenticated attacker could use this flaw to gain high privileges within cobbler, upload files to arbitrary location in the context ...

  • EPSS 0.58%
  • Veröffentlicht 01.08.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 02:59:44

It was found that foreman before 1.13.0 is vulnerable to a stored XSS via an organization or location name. This could allow an attacker with privileges to set the organization or location name to display arbitrary HTML including scripting code withi...

  • EPSS 0.21%
  • Veröffentlicht 30.07.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:32:03

A cross-site scripting (XSS) flaw was found in how the failed action entry is processed in Red Hat Satellite before version 5.8.0. A user able to specify a failed action could exploit this flaw to perform XSS attacks against other Satellite users.

  • EPSS 0.04%
  • Veröffentlicht 27.07.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:01:28

A flaw was found in katello-debug before 3.4.0 where certain scripts and log files used insecure temporary files. A local user could exploit this flaw to conduct a symbolic-link attack, allowing them to overwrite the contents of arbitrary files.

  • EPSS 0.77%
  • Veröffentlicht 27.07.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:31:58

It was found that spacewalk-channel can be used by a non-admin user or disabled users to perform administrative tasks due to an incorrect authorization check in backend/server/rhnChannel.py.

Exploit
  • EPSS 0.47%
  • Veröffentlicht 26.07.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:08:59

Red Hat Satellite before 6.5 is vulnerable to a XSS in discovery rule when you are entering filter and you use autocomplete functionality.

  • EPSS 0.28%
  • Veröffentlicht 26.07.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:32:07

A cross-site scripting (XSS) flaw was found in how an organization name is displayed in Satellite 5, before 5.8. A user able to change an organization's name could exploit this flaw to perform XSS attacks against other Satellite users.

  • EPSS 0.16%
  • Veröffentlicht 18.07.2018 13:29:03
  • Zuletzt bearbeitet 21.11.2024 04:04:52

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unau...

  • EPSS 0.27%
  • Veröffentlicht 18.07.2018 13:29:02
  • Zuletzt bearbeitet 21.11.2024 04:04:47

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows u...