Suse Manager Server vulnerabilities
8 known vulnerabilities affecting suse/manager_server.
Total CVEs
8
CISA KEV
1
actively exploited
Public exploits
1
Exploited in wild
1
Severity breakdown
CRITICAL1HIGH3MEDIUM4
Vulnerabilities
Page 1 of 1
CVE-2023-22644CRITICALCVSS 9.4≥ 4.2, < 4.2.50-150300.3.66.5≥ 4.3, < 4.3.58-150400.3.46.42023-09-20
CVE-2023-22644 [CRITICAL] CWE-1270 CVE-2023-22644: A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and AP
A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE.
nvd
CVE-2022-43754MEDIUMCVSS 5.4≥ 4.2, < 4.2.10≥ 4.3, < 4.3.22022-11-10
CVE-2022-43754 [LOW] CWE-79 CVE-2022-43754: An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerabilit
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in spacewalk/Uyuni of SUSE Linux Enterprise Module for SUSE Manager Server 4.2, SUSE Linux Enterprise Module for SUSE Manager Server 4.3, SUSE Manager Server 4.2 allows remote attackers to embed Javascript code via /rhn/audit/scap/Search.do This issue a
nvd
CVE-2022-43753MEDIUMCVSS 4.3≥ 4.2, < 4.2.10≥ 4.3, < 4.3.22022-11-10
CVE-2022-43753 [MEDIUM] CWE-22 CVE-2022-43753: A Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in sp
A Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in spacewalk/Uyuni of SUSE Linux Enterprise Module for SUSE Manager Server 4.2, SUSE Linux Enterprise Module for SUSE Manager Server 4.3, SUSE Manager Server 4.2 allows remote attackers to read files available to the user running the process, typically tomc
nvd
CVE-2022-31255MEDIUMCVSS 4.3≥ 4.2, < 4.2.10≥ 4.3, < 4.3.22022-11-10
CVE-2022-31255 [MEDIUM] CWE-22 CVE-2022-31255: An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in s
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in spacewalk/Uyuni of SUSE Linux Enterprise Module for SUSE Manager Server 4.2, SUSE Linux Enterprise Module for SUSE Manager Server 4.3, SUSE Manager Server 4.2 allows remote attackers to read files available to the user running the process, typically tom
nvd
CVE-2022-21952HIGHCVSS 7.5≥ 4.1, < 4.1.46≥ 4.2, < 4.2.372022-06-22
CVE-2022-21952 [HIGH] CWE-306 CVE-2022-21952: A Missing Authentication for Critical Function vulnerability in spacewalk-java of SUSE Manager Serve
A Missing Authentication for Critical Function vulnerability in spacewalk-java of SUSE Manager Server 4.1, SUSE Manager Server 4.2 allows remote attackers to easily exhaust available disk resources leading to DoS. This issue affects: SUSE Manager Server 4.1 spacewalk-java versions prior to 4.1.46. SUSE Manager Server 4.2 spacewalk-java versions prior
nvd
CVE-2022-31248MEDIUMCVSS 5.3≥ 4.1, < 4.1.46-1≥ 4.2, < 4.2.37-12022-06-22
CVE-2022-31248 [MEDIUM] CWE-204 CVE-2022-31248: A Observable Response Discrepancy vulnerability in spacewalk-java of SUSE Manager Server 4.1, SUSE M
A Observable Response Discrepancy vulnerability in spacewalk-java of SUSE Manager Server 4.1, SUSE Manager Server 4.2 allows remote attackers to discover valid usernames. This issue affects: SUSE Manager Server 4.1 spacewalk-java versions prior to 4.1.46-1. SUSE Manager Server 4.2 spacewalk-java versions prior to 4.2.37-1.
nvd
CVE-2022-27239HIGHCVSS 7.8v4.1v4.2+1 more2022-04-27
CVE-2022-27239 [HIGH] CWE-787 CVE-2022-27239: In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-li
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
nvd
CVE-2021-4034HIGHCVSS 7.8KEVPoCv4.12022-01-28
CVE-2021-4034 [HIGH] CWE-787 CVE-2021-4034: A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec applicat
A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variabl
nvd