Redhat Satellite vulnerabilities
222 known vulnerabilities affecting redhat/satellite.
Total CVEs
222
CISA KEV
4
actively exploited
Public exploits
7
Exploited in wild
4
Severity breakdown
CRITICAL30HIGH56MEDIUM109LOW27
Vulnerabilities
Page 6 of 12
CVE-2016-1000338HIGHCVSS 7.5v6.42018-06-01
CVE-2016-1000338 [HIGH] CWE-347 CVE-2016-1000338: In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not fully validate ASN.1 encodin
In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure.
nvd
CVE-2018-11212MEDIUMCVSS 6.5v5.82018-05-16
CVE-2018-11212 [MEDIUM] CWE-369 CVE-2018-11212: An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote a
An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.
nvd
CVE-2018-10237MEDIUMCVSS 5.9v6.42018-04-26
CVE-2018-10237 [MEDIUM] CWE-770 CVE-2018-10237: Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers
Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers to conduct denial of service attacks against servers that depend on this library and deserialize attacker-provided data, because the AtomicDoubleArray class (when serialized with Java serialization) and the CompoundOrdering class (when serialized with
nvd
CVE-2018-2794HIGHCVSS 7.7v5.6v5.7+1 more2018-04-19
CVE-2018-2794 [HIGH] CVE-2018-2794: Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supporte
Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful
nvd
CVE-2018-2783HIGHCVSS 7.4v5.6v5.7+1 more2018-04-19
CVE-2018-2783 [HIGH] CVE-2018-2783: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: S
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u161 and 8u152; Java SE Embedded: 8u152; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Ja
nvd
CVE-2018-2796MEDIUMCVSS 5.3v5.6v5.7+1 more2018-04-19
CVE-2018-2796 [MEDIUM] CVE-2018-2796: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: C
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Ja
nvd
CVE-2018-2800MEDIUMCVSS 4.2v5.6v5.7+1 more2018-04-19
CVE-2018-2800 [MEDIUM] CVE-2018-2800: Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: RMI). Supported ver
Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u181, 7u171 and 8u162; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks require human intera
nvd
CVE-2018-2795MEDIUMCVSS 5.3v5.6v5.7+1 more2018-04-19
CVE-2018-2795 [MEDIUM] CVE-2018-2795: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: S
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE
nvd
CVE-2018-2797MEDIUMCVSS 5.3v5.6v5.7+1 more2018-04-19
CVE-2018-2797 [MEDIUM] CVE-2018-2797: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: J
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Jav
nvd
CVE-2018-2799MEDIUMCVSS 5.3v5.6v5.7+1 more2018-04-19
CVE-2018-2799 [MEDIUM] CVE-2018-2799: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: J
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE E
nvd
CVE-2018-2798MEDIUMCVSS 5.3v5.6v5.7+1 more2018-04-19
CVE-2018-2798 [MEDIUM] CVE-2018-2798: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: A
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Jav
nvd
CVE-2018-2790LOWCVSS 3.1v5.6v5.7+1 more2018-04-19
CVE-2018-2790 [LOW] CVE-2018-2790: Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security).
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successfu
nvd
CVE-2016-9593HIGHCVSS 8.8v6.02018-04-16
CVE-2016-9593 [HIGH] CWE-522 CVE-2016-9593: foreman-debug before version 1.15.0 is vulnerable to a flaw in foreman-debug's logging. An attacker
foreman-debug before version 1.15.0 is vulnerable to a flaw in foreman-debug's logging. An attacker with access to the foreman log file would be able to view passwords, allowing them to access those systems.
nvd
CVE-2018-5382MEDIUMCVSS 4.4v6.42018-04-16
CVE-2018-5382 [MEDIUM] CWE-327 CVE-2018-5382: The default BKS keystore use an HMAC that is only 16 bits long, which can allow an attacker to compr
The default BKS keystore use an HMAC that is only 16 bits long, which can allow an attacker to compromise the integrity of a BKS keystore. Bouncy Castle release 1.47 changes the BKS format to a format which uses a 160 bit HMAC instead. This applies to any BKS keystore generated prior to BC 1.47. For situations where people need to create the files for
nvd
CVE-2018-1096MEDIUMCVSS 6.5v6.42018-04-05
CVE-2018-1096 [MEDIUM] CWE-89 CVE-2018-1096: An input sanitization flaw was found in the id field in the dashboard controller of Foreman before 1
An input sanitization flaw was found in the id field in the dashboard controller of Foreman before 1.16.1. A user could use this flaw to perform an SQL injection attack on the back end database.
nvd
CVE-2018-1097HIGHCVSS 8.8v6.42018-04-04
CVE-2018-1097 [HIGH] CWE-200 CVE-2018-1097: A flaw was found in foreman before 1.16.1. The issue allows users with limited permissions for power
A flaw was found in foreman before 1.16.1. The issue allows users with limited permissions for powering oVirt/RHV hosts on and off to discover the username and password used to connect to the compute resource.
nvd
CVE-2018-1077HIGHCVSS 7.5v5.02018-03-14
CVE-2018-1077 [HIGH] CWE-611 CVE-2018-1077: Spacewalk 2.6 contains an API which has an XXE flaw allowing for the disclosure of potentially sensi
Spacewalk 2.6 contains an API which has an XXE flaw allowing for the disclosure of potentially sensitive information from the server.
nvd
CVE-2017-2667HIGHCVSS 8.1v6.32018-03-12
CVE-2017-2667 [HIGH] CWE-345 CVE-2017-2667: Hammer CLI, a CLI utility for Foreman, before version 0.10.0, did not explicitly set the verify_ssl
Hammer CLI, a CLI utility for Foreman, before version 0.10.0, did not explicitly set the verify_ssl flag for apipie-bindings that disable it by default. As a result the server certificates are not checked and connections are prone to man-in-the-middle attacks.
nvd
CVE-2017-15136LOWCVSS 2.7v6.02018-02-27
CVE-2017-15136 [LOW] CWE-20 CVE-2017-15136: When registering and activating a new system with Red Hat Satellite 6 if the new systems hostname is
When registering and activating a new system with Red Hat Satellite 6 if the new systems hostname is then reset to the hostname of a previously registered system the previously registered system will lose access to updates including security updates.
nvd
CVE-2017-10689MEDIUMCVSS 5.5v6.42018-02-09
CVE-2017-10689 [MEDIUM] CWE-269 CVE-2017-10689: In previous versions of Puppet Agent it was possible to install a module with world writable permiss
In previous versions of Puppet Agent it was possible to install a module with world writable permissions. Puppet Agent 5.3.4 and 1.10.10 included a fix to this vulnerability.
nvd