Filtered by vendor Theforeman Subscriptions
Total 90 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2013-2101 2 Redhat, Theforeman 2 Satellite, Katello 2024-11-21 5.4 Medium
Katello has multiple XSS issues in various entities
CVE-2013-0283 1 Theforeman 1 Katello 2024-11-21 5.4 Medium
Katello: Username in Notification page has cross site scripting
CVE-2013-0210 1 Theforeman 1 Foreman 2024-11-21 N/A
The smart proxy Puppet run API in Foreman before 1.2.0 allows remote attackers to execute arbitrary commands via vectors related to escaping and Puppet commands.
CVE-2013-0187 1 Theforeman 1 Foreman 2024-11-21 N/A
Foreman before 1.1 allows remote authenticated users to gain privileges via a (1) XMLHttpRequest or (2) AJAX request.
CVE-2013-0174 1 Theforeman 1 Foreman 2024-11-21 N/A
The external node classifier (ENC) API in Foreman before 1.1 allows remote attackers to obtain the hashed root password via an API request.
CVE-2013-0173 1 Theforeman 1 Foreman 2024-11-21 N/A
Foreman before 1.1 uses a salt of "foreman" to hash root passwords, which makes it easier for attackers to guess the password via a brute force attack.
CVE-2013-0171 1 Theforeman 1 Foreman 2024-11-21 N/A
Foreman before 1.1 allows remote attackers to execute arbitrary code via a crafted YAML object to the (1) fact or (2) report import API.
CVE-2012-5648 1 Theforeman 1 Foreman 2024-11-21 N/A
Multiple SQL injection vulnerabilities in Foreman before 1.0.2 allow remote attackers to execute arbitrary SQL commands via unspecified parameters to (1) app/models/hostext/search.rb or (2) app/models/puppetclass.rb, related to the search mechanism.
CVE-2012-5477 1 Theforeman 1 Foreman 2024-11-21 N/A
The smart proxy in Foreman before 1.1 uses a umask set to 0, which allows local users to modify files created by the daemon via unspecified vectors.
CVE-2012-3503 4 Cloudforms Systemengine, Redhat, Rhel Sam and 1 more 4 1, Enterprise Linux Server, 1.1 and 1 more 2024-11-21 9.8 Critical
The installation script in Katello 1.0 and earlier does not properly generate the Application.config.secret_token value, which causes each default installation to have the same secret token, and allows remote attackers to authenticate to the CloudForms System Engine web interface as an arbitrary user by creating a cookie using the default secret_token.