rpm package
suse/openstack-monasca-persister-java&distro=SUSE OpenStack Cloud Crowbar 9
pkg:rpm/suse/openstack-monasca-persister-java&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209
Vulnerabilities (13)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2022-23307 | — | < 1.12.1~dev9-15.1 | 1.12.1~dev9-15.1 | Jan 18, 2022 | CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists. | ||
| CVE-2022-23305 | — | < 1.12.1~dev9-15.1 | 1.12.1~dev9-15.1 | Jan 18, 2022 | By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering | ||
| CVE-2022-23302 | — | < 1.12.1~dev9-15.1 | 1.12.1~dev9-15.1 | Jan 18, 2022 | JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBi | ||
| CVE-2021-4104 | — | < 1.12.1~dev9-12.2 | 1.12.1~dev9-12.2 | Dec 14, 2021 | JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests t | ||
| CVE-2019-13611 | — | < 1.12.1~dev9-9.1 | 1.12.1~dev9-9.1 | Jul 15, 2019 | An issue was discovered in python-engineio through 3.8.2. There is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability that allows attackers to make WebSocket connections to a server by using a victim's credentials, because the Origin header is not restricted. | ||
| CVE-2019-11324 | — | < 1.12.1~dev9-9.1 | 1.12.1~dev9-9.1 | Apr 18, 2019 | The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is | ||
| CVE-2019-11236 | — | < 1.12.1~dev9-9.1 | 1.12.1~dev9-9.1 | Apr 15, 2019 | In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter. | ||
| CVE-2019-9740 | — | < 1.12.1~dev9-9.1 | 1.12.1~dev9-9.1 | Mar 13, 2019 | An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string | ||
| CVE-2019-9735 | — | < 1.12.1~dev9-9.1 | 1.12.1~dev9-9.1 | Mar 13, 2019 | An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example, | ||
| CVE-2019-7164 | — | < 1.12.1~dev9-9.1 | 1.12.1~dev9-9.1 | Feb 20, 2019 | SQLAlchemy through 1.2.17 and 1.3.x through 1.3.0b2 allows SQL Injection via the order_by parameter. | ||
| CVE-2019-7548 | — | < 1.12.1~dev9-9.1 | 1.12.1~dev9-9.1 | Feb 6, 2019 | SQLAlchemy 1.2.17 has SQL Injection when the group_by parameter can be controlled. | ||
| CVE-2017-17051 | Hig | 8.6 | < 1.12.1~dev9-9.1 | 1.12.1~dev9-9.1 | Dec 5, 2017 | An issue was discovered in the default FilterScheduler in OpenStack Nova 16.0.3. By repeatedly rebuilding an instance with new images, an authenticated user may consume untracked resources on a hypervisor host leading to a denial of service, aka doubled resource allocations. This | |
| CVE-2015-3448 | — | < 1.12.1~dev9-9.1 | 1.12.1~dev9-9.1 | Apr 29, 2015 | REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log. |
- CVE-2022-23307Jan 18, 2022affected < 1.12.1~dev9-15.1fixed 1.12.1~dev9-15.1
CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.
- CVE-2022-23305Jan 18, 2022affected < 1.12.1~dev9-15.1fixed 1.12.1~dev9-15.1
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering
- CVE-2022-23302Jan 18, 2022affected < 1.12.1~dev9-15.1fixed 1.12.1~dev9-15.1
JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBi
- CVE-2021-4104Dec 14, 2021affected < 1.12.1~dev9-12.2fixed 1.12.1~dev9-12.2
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests t
- CVE-2019-13611Jul 15, 2019affected < 1.12.1~dev9-9.1fixed 1.12.1~dev9-9.1
An issue was discovered in python-engineio through 3.8.2. There is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability that allows attackers to make WebSocket connections to a server by using a victim's credentials, because the Origin header is not restricted.
- CVE-2019-11324Apr 18, 2019affected < 1.12.1~dev9-9.1fixed 1.12.1~dev9-9.1
The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is
- CVE-2019-11236Apr 15, 2019affected < 1.12.1~dev9-9.1fixed 1.12.1~dev9-9.1
In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.
- CVE-2019-9740Mar 13, 2019affected < 1.12.1~dev9-9.1fixed 1.12.1~dev9-9.1
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string
- CVE-2019-9735Mar 13, 2019affected < 1.12.1~dev9-9.1fixed 1.12.1~dev9-9.1
An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example,
- CVE-2019-7164Feb 20, 2019affected < 1.12.1~dev9-9.1fixed 1.12.1~dev9-9.1
SQLAlchemy through 1.2.17 and 1.3.x through 1.3.0b2 allows SQL Injection via the order_by parameter.
- CVE-2019-7548Feb 6, 2019affected < 1.12.1~dev9-9.1fixed 1.12.1~dev9-9.1
SQLAlchemy 1.2.17 has SQL Injection when the group_by parameter can be controlled.
- affected < 1.12.1~dev9-9.1fixed 1.12.1~dev9-9.1
An issue was discovered in the default FilterScheduler in OpenStack Nova 16.0.3. By repeatedly rebuilding an instance with new images, an authenticated user may consume untracked resources on a hypervisor host leading to a denial of service, aka doubled resource allocations. This
- CVE-2015-3448Apr 29, 2015affected < 1.12.1~dev9-9.1fixed 1.12.1~dev9-9.1
REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.