Show filters
66 Total Results
Displaying 31-40 of 66
Sort by:
Attacker Value
Unknown

CVE-2020-17490

Disclosure Date: November 06, 2020 (last updated February 22, 2025)
The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions.
Attacker Value
Unknown

CVE-2020-8028

Disclosure Date: September 16, 2020 (last updated February 22, 2025)
A Improper Access Control vulnerability in the configuration of salt of SUSE Linux Enterprise Module for SUSE Manager Server 4.1, SUSE Manager Proxy 4.0, SUSE Manager Retail Branch Server 4.0, SUSE Manager Server 3.2, SUSE Manager Server 4.0 allows local users to escalate to root on every system managed by SUSE manager. On the managing node itself code can be executed as user salt, potentially allowing for escalation to root there. This issue affects: SUSE Linux Enterprise Module for SUSE Manager Server 4.1 google-gson versions prior to 2.8.5-3.4.3, httpcomponents-client-4.5.6-3.4.2, httpcomponents-. SUSE Manager Proxy 4.0 release-notes-susemanager-proxy versions prior to 4.0.9-0.16.38.1. SUSE Manager Retail Branch Server 4.0 release-notes-susemanager-proxy versions prior to 4.0.9-0.16.38.1. SUSE Manager Server 3.2 salt-netapi-client versions prior to 0.16.0-4.14.1, spacewalk-. SUSE Manager Server 4.0 release-notes-susemanager versions prior to 4.0.9-3.54.1.
Attacker Value
Unknown

CVE-2020-11652

Disclosure Date: April 30, 2020 (last updated February 21, 2025)
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.
Attacker Value
Unknown

CVE-2019-17361

Disclosure Date: January 17, 2020 (last updated February 21, 2025)
In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
Attacker Value
Unknown

CVE-2013-2228

Disclosure Date: December 03, 2019 (last updated November 27, 2024)
SaltStack RSA Key Generation allows remote users to decrypt communications
Attacker Value
Unknown

CVE-2019-1010259

Disclosure Date: July 18, 2019 (last updated November 27, 2024)
SaltStack Salt 2018.3, 2019.2 is affected by: SQL Injection. The impact is: An attacker could escalate privileges on MySQL server deployed by cloud provider. It leads to RCE. The component is: The mysql.user_chpass function from the MySQL module for Salt. The attack vector is: specially crafted password string. The fixed version is: 2018.3.4.
0
Attacker Value
Unknown

CVE-2018-18762

Disclosure Date: March 21, 2019 (last updated November 27, 2024)
SaltOS 3.1 r8126 contains a database download vulnerability.
0
Attacker Value
Unknown

CVE-2018-18761

Disclosure Date: November 16, 2018 (last updated November 27, 2024)
SaltOS 3.1 r8126 allows action=login&querystring=&user=[SQL] SQL Injection.
Attacker Value
Unknown

CVE-2018-18763

Disclosure Date: November 16, 2018 (last updated November 27, 2024)
SaltOS 3.1 r8126 allows action=ajax&query=numbers&page=usuarios&action2=[SQL] SQL Injection.
0
Attacker Value
Unknown

CVE-2018-15751

Disclosure Date: October 24, 2018 (last updated November 27, 2024)
SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allow remote attackers to bypass authentication and execute arbitrary commands via salt-api(netapi).
0