Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat satellite 6.0 vulnerabilities and exploits
(subscribe to this query)
6.2
CVSSv3
CVE-2024-3716
A flaw was found in foreman-installer when puppet-candlepin is invoked cpdb with the --password parameter. This issue leaks the password in the process list and allows an malicious user to take advantage and obtain the password.
Redhat Satellite 6.0
5.3
CVSSv3
CVE-2021-20256
A flaw was found in Red Hat Satellite. The BMC interface exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Redhat Satellite 6.0
8.8
CVSSv3
CVE-2020-14334
A flaw was found in Red Hat Satellite 6 which allows privileged malicious user to read cache files. These cache credentials could help malicious user to gain complete control of the Satellite instance.
Redhat Satellite 6.0
6.5
CVSSv3
CVE-2020-14371
A credential leak vulnerability was found in Red Hat Satellite. This flaw exposes the compute resources credentials through VMs that are running on these resources in Satellite.
Redhat Satellite 6.0
6.1
CVSSv3
CVE-2014-8168
Red Hat Satellite 6 allows local users to access mongod and delete pulp_database.
Redhat Satellite 6.0
5.5
CVSSv3
CVE-2020-14335
A flaw was found in Red Hat Satellite, which allows a privileged malicious user to read OMAPI secrets through the ISC DHCP of Smart-Proxy. This flaw allows an malicious user to gain control of DHCP records from the network. The highest threat from this vulnerability is to system ...
Redhat Satellite 6.0
2.7
CVSSv3
CVE-2017-15136
When registering and activating a new system with Red Hat Satellite 6 if the new systems hostname is then reset to the hostname of a previously registered system the previously registered system will lose access to updates including security updates.
Redhat Satellite 6.0
6.5
CVSSv3
CVE-2014-3590
Versions of Foreman as shipped with Red Hat Satellite 6 does not check for a correct CSRF token in the logout action. Therefore, an attacker can log out a user by having them view specially crafted content.
Redhat Satellite 6.0
8.1
CVSSv3
CVE-2023-1832
An improper access control flaw was found in Candlepin. An attacker can create data scoped under another customer/tenant, which can result in loss of confidentiality and availability for the affected customer/tenant.
Candlepinproject Candlepin
Redhat Satellite 6.0
4.4
CVSSv3
CVE-2023-4886
A sensitive information exposure vulnerability was found in foreman. Contents of tomcat's server.xml file, which contain passwords to candlepin's keystore and truststore, were found to be world readable.
Theforeman Foreman
Redhat Satellite 6.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4541
CVE-2024-3080
CVE-2024-4787
log injection
CVE-2024-5967
inject
CVE-2024-30078
CVE-2024-5899
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »