VYPR

rpm package

suse/openstack-heat&distro=SUSE OpenStack Cloud Crowbar 9

pkg:rpm/suse/openstack-heat&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209

Vulnerabilities (30)

  • CVE-2023-1625Sep 24, 2023
    affected < 11.0.4~dev4-3.24.4fixed 11.0.4~dev4-3.24.4

    An information leak was discovered in OpenStack heat. This issue could allow a remote, authenticated attacker to use the 'stack show' command to reveal parameters which are supposed to remain hidden. This has a low impact to the confidentiality, integrity, and availability of the

  • CVE-2023-25577Feb 14, 2023
    affected < 11.0.4~dev4-3.24.4fixed 11.0.4~dev4-3.24.4

    Werkzeug is a comprehensive WSGI web application library. Prior to version 2.2.3, Werkzeug's multipart form data parser will parse an unlimited number of parts, including file parts. Parts can be a small amount of bytes, but each requires CPU time to parse and may use more memory

  • CVE-2022-47950Jan 18, 2023
    affected < 11.0.4~dev4-3.24.4fixed 11.0.4~dev4-3.24.4

    An issue was discovered in OpenStack Swift before 2.28.1, 2.29.x before 2.29.2, and 2.30.0. By supplying crafted XML files, an authenticated user may coerce the S3 API into returning arbitrary file contents from the host server, resulting in unauthorized read access to potentiall

  • CVE-2019-20933Nov 19, 2020
    affected < 11.0.4~dev4-3.19.2fixed 11.0.4~dev4-3.19.2

    InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in services/httpd/handler.go because a JWT token may have an empty SharedSecret (aka shared secret).

  • CVE-2020-24303Oct 28, 2020
    affected < 11.0.4~dev4-3.19.2fixed 11.0.4~dev4-3.19.2

    Grafana before 7.1.0-beta 1 allows XSS via a query alias for the ElasticSearch datasource.

  • CVE-2020-26137Sep 29, 2020
    affected < 11.0.4~dev4-3.19.2fixed 11.0.4~dev4-3.19.2

    urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.

  • CVE-2018-17954Apr 3, 2020
    affected < 11.0.3~dev31-3.13.3fixed 11.0.3~dev31-3.13.3

    An Improper Privilege Management in crowbar of SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud 9, SUSE OpenStack Cloud Crowbar 8, SUSE OpenStack Cloud Crowbar 9 allows root users on any crowbar managed node to cause become root on any other node. This issue a

  • CVE-2020-9543Mar 12, 2020
    affected < 11.0.3~dev35-3.16.1fixed 11.0.3~dev35-3.16.1

    OpenStack Manila <7.4.1, >=8.0.0 <8.1.1, and >=9.0.0 <9.1.1 allows attackers to view, update, delete, or share resources that do not belong to them, because of a context-free lookup of a UUID. Attackers may also create resources, such as shared file systems and groups of shares o

  • CVE-2020-5247Feb 28, 2020
    affected < 11.0.3~dev35-3.16.1fixed 11.0.3~dev35-3.16.1

    In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entir

  • CVE-2020-5390Jan 13, 2020
    affected < 11.0.4~dev4-3.19.2fixed 11.0.4~dev4-3.19.2

    PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus

  • CVE-2019-16770Dec 5, 2019
    affected < 11.0.3~dev31-3.13.3fixed 11.0.3~dev31-3.13.3

    In Puma before versions 3.12.2 and 4.3.1, a poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait p

  • CVE-2019-15026Aug 30, 2019
    affected < 11.0.3~dev35-3.16.1fixed 11.0.3~dev35-3.16.1

    memcached 1.5.16, when UNIX sockets are used, has a stack-based buffer over-read in conn_to_str in memcached.c.

  • CVE-2019-13611Jul 15, 2019
    affected < 11.0.3~dev19-3.7.2fixed 11.0.3~dev19-3.7.2

    An issue was discovered in python-engineio through 3.8.2. There is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability that allows attackers to make WebSocket connections to a server by using a victim's credentials, because the Origin header is not restricted.

  • CVE-2019-13117Jul 1, 2019
    affected < 11.0.3~dev31-3.13.3fixed 11.0.3~dev31-3.13.3

    In numbers.c in libxslt 1.1.33, an xsl:number with certain format strings could lead to a uninitialized read in xsltNumberFormatInsertNumbers. This could allow an attacker to discern whether a byte on the stack contains the characters A, a, I, i, or 0, or any other character.

  • CVE-2019-0201May 23, 2019
    affected < 11.0.3~dev35-3.16.1fixed 11.0.3~dev35-3.16.1

    An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper’s getACL() command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuth

  • CVE-2019-11596Apr 29, 2019
    affected < 11.0.3~dev35-3.16.1fixed 11.0.3~dev35-3.16.1

    In memcached before 1.5.14, a NULL pointer dereference was found in the "lru mode" and "lru temp_ttl" commands. This causes a denial of service when parsing crafted lru command messages in process_lru_command in memcached.c.

  • CVE-2019-11324Apr 18, 2019
    affected < 11.0.3~dev19-3.7.2fixed 11.0.3~dev19-3.7.2

    The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is

  • CVE-2019-11236Apr 15, 2019
    affected < 11.0.3~dev19-3.7.2fixed 11.0.3~dev19-3.7.2

    In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.

  • CVE-2019-11068Apr 10, 2019
    affected < 11.0.3~dev5-3.3.8fixed 11.0.3~dev5-3.3.8

    libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.

  • CVE-2016-10745Apr 8, 2019
    affected < 11.0.4~dev4-3.19.2fixed 11.0.4~dev4-3.19.2

    In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.

Page 1 of 2