Redhat

Satellite Capsule

13 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.22%
  • Published 27.05.2021 19:15:07
  • Last modified 21.11.2024 04:55:54

A flaw was found in Red Hat Satellite's Job Invocation, where the "User Input" entry was not properly restricted to the view. This flaw allows a malicious Satellite user to scan through the Job Invocation, with the ability to search for passwords and...

  • EPSS 0.03%
  • Published 06.05.2020 14:15:10
  • Last modified 21.11.2024 04:55:52

A flaw was found in Hibernate Validator version 6.1.2.Final. A bug in the message interpolation processor enables invalid EL expressions to be evaluated as if they were valid. This flaw allows attackers to bypass input sanitation (escaping, stripping...

Exploit
  • EPSS 1%
  • Published 20.08.2018 19:31:31
  • Last modified 21.11.2024 03:40:16

dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be explo...

  • EPSS 0.58%
  • Published 01.08.2018 13:29:00
  • Last modified 21.11.2024 02:59:44

It was found that foreman before 1.13.0 is vulnerable to a stored XSS via an organization or location name. This could allow an attacker with privileges to set the organization or location name to display arbitrary HTML including scripting code withi...

  • EPSS 0.04%
  • Published 27.07.2018 18:29:00
  • Last modified 21.11.2024 03:01:28

A flaw was found in katello-debug before 3.4.0 where certain scripts and log files used insecure temporary files. A local user could exploit this flaw to conduct a symbolic-link attack, allowing them to overwrite the contents of arbitrary files.

  • EPSS 0.38%
  • Published 01.06.2018 20:29:00
  • Last modified 05.05.2025 14:14:28

In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in s...

  • EPSS 3.26%
  • Published 26.04.2018 21:29:00
  • Last modified 21.11.2024 03:41:04

Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers to conduct denial of service attacks against servers that depend on this library and deserialize attacker-provided data, because the AtomicDoubleArray...

  • EPSS 0.19%
  • Published 16.04.2018 14:29:01
  • Last modified 12.05.2025 17:37:16

The default BKS keystore use an HMAC that is only 16 bits long, which can allow an attacker to compromise the integrity of a BKS keystore. Bouncy Castle release 1.47 changes the BKS format to a format which uses a 160 bit HMAC instead. This applies t...

  • EPSS 0.11%
  • Published 12.03.2018 15:29:00
  • Last modified 21.11.2024 03:23:56

Hammer CLI, a CLI utility for Foreman, before version 0.10.0, did not explicitly set the verify_ssl flag for apipie-bindings that disable it by default. As a result the server certificates are not checked and connections are prone to man-in-the-middl...

  • EPSS 7.41%
  • Published 06.02.2018 15:29:00
  • Last modified 21.11.2024 03:14:03

A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMappe...