Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
subscription asset manager vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2012-6685
Nokogiri prior to 1.5.4 is vulnerable to XXE attacks
Nokogiri Nokogiri
Redhat Openstack 4.0
Redhat Cloudforms Management Engine 5.0
Redhat Satellite 6.0
Redhat Openstack 6.0
Redhat Subscription Asset Manager -
Redhat Openshift 2.0
Redhat Openstack Foreman -
Redhat Enterprise Mrg 2.0
1 Article
383
VMScore
CVE-2014-0183
Versions of Katello as shipped with Red Hat Subscription Asset Manager 1.4 are vulnerable to a XSS via HTML in the systems name when registering.
Redhat Subscription Asset Manager 1.4.0
383
VMScore
CVE-2014-0026
katello-headpin is vulnerable to CSRF in REST API
Redhat Subscription Asset Manager 1.0.0
383
VMScore
CVE-2013-6460
Nokogiri gem 1.5.x has Denial of Service via infinite loop when parsing XML documents
Nokogiri Nokogiri
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Redhat Openstack 4.0
Redhat Cloudforms Management Engine 5.0
Redhat Openstack 3.0
Redhat Satellite 6.0
Redhat Subscription Asset Manager -
Redhat Enterprise Mrg 2.0
383
VMScore
CVE-2013-6461
Nokogiri gem 1.5.x and 1.6.x has DoS while parsing XML entities by failing to apply limits
Nokogiri Nokogiri
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Redhat Openstack 4.0
Redhat Cloudforms Management Engine 5.0
Redhat Openstack 3.0
Redhat Satellite 6.0
Redhat Subscription Asset Manager -
Redhat Enterprise Mrg 2.0
383
VMScore
CVE-2014-0029
Multiple cross-site scripting (XSS) vulnerabilities in the SAM web application in Red Hat katello-headpin allow remote malicious users to inject arbitrary web script or HTML via unspecified parameters.
Redhat Subscription Asset Manager 1.0.0
187
VMScore
CVE-2012-6119
Candlepin prior to 0.7.24, as used in Red Hat Subscription Asset Manager prior to 1.2.1, does not properly check manifest signatures, which allows local users to modify manifests.
Redhat Subscription Asset Manager 1.1.0
Redhat Subscription Asset Manager 1.0.0
Candlepinproject Candlepin 0.4.11
Redhat Subscription Asset Manager
Candlepinproject Candlepin 0.6.3
Candlepinproject Candlepin
Candlepinproject Candlepin 0.4.27
Candlepinproject Candlepin 0.5.5
Candlepinproject Candlepin 0.4.5
383
VMScore
CVE-2012-6109
lib/rack/multipart.rb in Rack prior to 1.1.4, 1.2.x prior to 1.2.6, 1.3.x prior to 1.3.7, and 1.4.x prior to 1.4.2 uses an incorrect regular expression, which allows remote malicious users to cause a denial of service (infinite loop) via a crafted Content-Disposion header.
Rack Project Rack 0.4
Rack Project Rack 1.1.2
Rack Project Rack 0.2
Rack Project Rack 0.1
Rack Project Rack 1.1.0
Rack Project Rack 0.9
Rack Project Rack 1.0.1
Rack Project Rack
Rack Project Rack 0.3
Rack Project Rack 0.9.1
Rack Project Rack 1.0.0
Rack Project Rack 1.2.3
Rack Project Rack 1.2.0
Rack Project Rack 1.2.1
Rack Project Rack 1.2.4
Rack Project Rack 1.2.2
Rack Project Rack 1.3.1
Rack Project Rack 1.3.2
Rack Project Rack 1.3.5
Rack Project Rack 1.3.6
Rack Project Rack 1.3.0
Rack Project Rack 1.3.4
383
VMScore
CVE-2013-0256
darkfish.js in RDoc 2.3.0 up to and including 3.12 and 4.x prior to 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote malicious users to conduct cross-site scripting (XSS) attacks via a crafted URL.
Ruby-lang Ruby 2.0.0
Ruby-lang Ruby 1.9.3
Ruby-lang Ruby 2.0
Ruby-lang Ruby 1.9.2
Ruby-lang Ruby 1.9.1
Ruby-lang Ruby 1.9
Ruby-lang Rdoc
Ruby-lang Rdoc 4.0.0
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 12.04
187
VMScore
CVE-2013-0162
The diff_pp function in lib/gauntlet_rubyparser.rb in the ruby_parser gem 3.1.1 and previous versions for Ruby allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp.
Ryan Davis Ruby Parser 2.2.0
Ryan Davis Ruby Parser 3.0.0.a6
Ryan Davis Ruby Parser 3.0.4
Ryan Davis Ruby Parser 3.0.0.a7
Ryan Davis Ruby Parser 3.0.1
Ryan Davis Ruby Parser 3.0.0
Ryan Davis Ruby Parser 3.0.0.a8
Ryan Davis Ruby Parser 3.0.0.a2
Ryan Davis Ruby Parser 2.0.1
Ryan Davis Ruby Parser 2.3.1
Ryan Davis Ruby Parser 3.0.0.a5
Ryan Davis Ruby Parser 3.0.0.a3
Ryan Davis Ruby Parser 2.0.3
Ryan Davis Ruby Parser 3.0.3
Ryan Davis Ruby Parser 2.0.6
Ryan Davis Ruby Parser 1.0.0
Ryan Davis Ruby Parser 3.0.2
Ryan Davis Ruby Parser 3.0.0.a9
Ryan Davis Ruby Parser 2.3.0
Ryan Davis Ruby Parser 3.0.0.a10
Ryan Davis Ruby Parser
Ryan Davis Ruby Parser 2.0.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »