VYPR

rpm package

suse/openstack-monasca-persister-java&distro=SUSE OpenStack Cloud Crowbar 9

pkg:rpm/suse/openstack-monasca-persister-java&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209

Vulnerabilities (13)

  • CVE-2022-23307Jan 18, 2022
    affected < 1.12.1~dev9-15.1fixed 1.12.1~dev9-15.1

    CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.

  • CVE-2022-23305Jan 18, 2022
    affected < 1.12.1~dev9-15.1fixed 1.12.1~dev9-15.1

    By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering

  • CVE-2022-23302Jan 18, 2022
    affected < 1.12.1~dev9-15.1fixed 1.12.1~dev9-15.1

    JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBi

  • CVE-2021-4104Dec 14, 2021
    affected < 1.12.1~dev9-12.2fixed 1.12.1~dev9-12.2

    JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests t

  • CVE-2019-13611Jul 15, 2019
    affected < 1.12.1~dev9-9.1fixed 1.12.1~dev9-9.1

    An issue was discovered in python-engineio through 3.8.2. There is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability that allows attackers to make WebSocket connections to a server by using a victim's credentials, because the Origin header is not restricted.

  • CVE-2019-11324Apr 18, 2019
    affected < 1.12.1~dev9-9.1fixed 1.12.1~dev9-9.1

    The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is

  • CVE-2019-11236Apr 15, 2019
    affected < 1.12.1~dev9-9.1fixed 1.12.1~dev9-9.1

    In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.

  • CVE-2019-9740Mar 13, 2019
    affected < 1.12.1~dev9-9.1fixed 1.12.1~dev9-9.1

    An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string

  • CVE-2019-9735Mar 13, 2019
    affected < 1.12.1~dev9-9.1fixed 1.12.1~dev9-9.1

    An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example,

  • CVE-2019-7164Feb 20, 2019
    affected < 1.12.1~dev9-9.1fixed 1.12.1~dev9-9.1

    SQLAlchemy through 1.2.17 and 1.3.x through 1.3.0b2 allows SQL Injection via the order_by parameter.

  • CVE-2019-7548Feb 6, 2019
    affected < 1.12.1~dev9-9.1fixed 1.12.1~dev9-9.1

    SQLAlchemy 1.2.17 has SQL Injection when the group_by parameter can be controlled.

  • CVE-2017-17051HigDec 5, 2017
    affected < 1.12.1~dev9-9.1fixed 1.12.1~dev9-9.1

    An issue was discovered in the default FilterScheduler in OpenStack Nova 16.0.3. By repeatedly rebuilding an instance with new images, an authenticated user may consume untracked resources on a hypervisor host leading to a denial of service, aka doubled resource allocations. This

  • CVE-2015-3448Apr 29, 2015
    affected < 1.12.1~dev9-9.1fixed 1.12.1~dev9-9.1

    REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.