
CVE-2014-0026
https://notcve.org/view.php?id=CVE-2014-0026
11 Dec 2019 — katello-headpin is vulnerable to CSRF in REST API katello-headpin es vulnerable a un ataque de tipo CSRF en la API REST. • https://access.redhat.com/security/cve/cve-2014-0026 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2014-0029
https://notcve.org/view.php?id=CVE-2014-0029
16 Oct 2017 — Multiple cross-site scripting (XSS) vulnerabilities in the SAM web application in Red Hat katello-headpin allow remote attackers to inject arbitrary web script or HTML via unspecified parameters. Múltiples vulnerabilidades de Cross-Site Scripting (XSS) en la aplicación web SAM en Red Hat katello-headpin permiten que atacantes remotos inyecten scripts web o HTML arbitrarios mediante parámetros sin especificar. • https://bugzilla.redhat.com/show_bug.cgi?id=1059433 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2015-7501 – apache-commons-collections: InvokerTransformer code execution during deserialisation
https://notcve.org/view.php?id=CVE-2015-7501
20 Nov 2015 — Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collect... • https://github.com/ianxtianxt/CVE-2015-7501 • CWE-284: Improper Access Control CWE-502: Deserialization of Untrusted Data •

CVE-2014-0130 – Ruby on Rails Directory Traversal Vulnerability
https://notcve.org/view.php?id=CVE-2014-0130
07 May 2014 — Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request. Vulnerabilidad de salto de directorio en actionpack/lib/abstract_controller/base.rb en la implementación implicit-render en Ruby on Rails anterior a 3.2.18, 4.0.x anterior a 4.0.5 y 4.1.x ant... • https://github.com/omarkurt/cve-2014-0130 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2013-6439 – candlepin: insecure authentication enabled by default
https://notcve.org/view.php?id=CVE-2013-6439
22 Dec 2013 — Candlepin in Red Hat Subscription Asset Manager 1.0 through 1.3 uses a weak authentication scheme when the configuration file does not specify a scheme, which has unspecified impact and attack vectors. Candlepin en Red Hat Subscription Asset Manager v1.0 hasta v1.3 utiliza un esquema de autenticación débil cuando el archivo de configuración no especifica un esquema, lo cual tiene un impacto no especificado y vectores de ataque. Candlepin is an open source entitlement management system. It tracks the product... • http://rhn.redhat.com/errata/RHSA-2013-1863.html • CWE-287: Improper Authentication CWE-290: Authentication Bypass by Spoofing •

CVE-2012-6119 – Candlepin: Re-enable manifest signature checking
https://notcve.org/view.php?id=CVE-2012-6119
02 Apr 2013 — Candlepin before 0.7.24, as used in Red Hat Subscription Asset Manager before 1.2.1, does not properly check manifest signatures, which allows local users to modify manifests. Candlepin antes de v0.7.24, tal como se utiliza en el Administrador de Activos de Red Hat Suscripción antes de v1.2.1, no comprueba correctamente firmas de los manifest, que permite a usuarios locales modificarlos. • http://rhn.redhat.com/errata/RHSA-2013-0686.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2013-1823 – Katello: Notifications page Username XSS
https://notcve.org/view.php?id=CVE-2013-1823
02 Apr 2013 — Cross-site scripting (XSS) vulnerability in the Notifications form in Red Hat Subscription Asset Manager before 1.2.1 allows remote attackers to inject arbitrary web script or HTML via the username field. Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en los Notifications de Red Hat Subscription Asset Manager antes de v1.2.1 que permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del campo de nombre de usuario (Username) • http://rhn.redhat.com/errata/RHSA-2013-0686.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •