rpm package
suse/openstack-neutron-fwaas-doc&distro=SUSE OpenStack Cloud 7
pkg:rpm/suse/openstack-neutron-fwaas-doc&distro=SUSE%20OpenStack%20Cloud%207
Vulnerabilities (33)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2020-10743 | — | < 9.0.2~dev5-4.9.4 | 9.0.2~dev5-4.9.4 | Jun 2, 2021 | It was discovered that OpenShift Container Platform's (OCP) distribution of Kibana could open in an iframe, which made it possible to intercept and manipulate requests. This flaw allows an attacker to trick a user into performing arbitrary actions in OCP's distribution of Kibana, | ||
| CVE-2020-13379 | — | < 9.0.2~dev5-4.9.4 | 9.0.2~dev5-4.9.4 | Jun 3, 2020 | The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information abo | ||
| CVE-2020-13596 | — | < 9.0.2~dev5-4.9.4 | 9.0.2~dev5-4.9.4 | Jun 3, 2020 | An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack. | ||
| CVE-2020-13254 | — | < 9.0.2~dev5-4.9.4 | 9.0.2~dev5-4.9.4 | Jun 3, 2020 | An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage. | ||
| CVE-2020-11077 | — | < 9.0.2~dev5-4.9.4 | 9.0.2~dev5-4.9.4 | May 22, 2020 | In Puma (RubyGem) before 4.3.5 and 3.12.6, a client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mis | ||
| CVE-2020-11076 | — | < 9.0.2~dev5-4.9.4 | 9.0.2~dev5-4.9.4 | May 22, 2020 | In Puma (RubyGem) before 4.3.4 and 3.12.5, an attacker could smuggle an HTTP response, by using an invalid transfer-encoding header. The problem has been fixed in Puma 3.12.5 and Puma 4.3.4. | ||
| CVE-2020-8151 | — | < 9.0.2~dev5-4.9.4 | 9.0.2~dev5-4.9.4 | May 12, 2020 | There is a possible information disclosure issue in Active Resource <v5.1.1 that could allow an attacker to create specially crafted requests to access data in an unexpected way and possibly leak information. | ||
| CVE-2020-10663 | — | < 9.0.2~dev5-4.9.4 | 9.0.2~dev5-4.9.4 | Apr 28, 2020 | The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically, | ||
| CVE-2020-12052 | — | < 9.0.2~dev5-4.9.4 | 9.0.2~dev5-4.9.4 | Apr 27, 2020 | Grafana version < 6.7.3 is vulnerable for annotation popup XSS. | ||
| CVE-2018-17954 | — | < 9.0.2~dev5-4.6.1 | 9.0.2~dev5-4.6.1 | Apr 3, 2020 | An Improper Privilege Management in crowbar of SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud 9, SUSE OpenStack Cloud Crowbar 8, SUSE OpenStack Cloud Crowbar 9 allows root users on any crowbar managed node to cause become root on any other node. This issue a | ||
| CVE-2020-5247 | — | < 9.0.2~dev5-4.9.4 | 9.0.2~dev5-4.9.4 | Feb 28, 2020 | In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entir | ||
| CVE-2019-16792 | — | < 9.0.2~dev5-4.9.4 | 9.0.2~dev5-4.9.4 | Jan 22, 2020 | Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally. | ||
| CVE-2020-5390 | — | < 9.0.2~dev5-4.9.4 | 9.0.2~dev5-4.9.4 | Jan 13, 2020 | PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus | ||
| CVE-2019-19911 | — | < 9.0.2~dev5-4.9.4 | 9.0.2~dev5-4.9.4 | Jan 5, 2020 | There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows running 32-bit Python, this results in an OverflowError or MemoryError due to the 2 GB limit. Ho | ||
| CVE-2020-5312 | — | < 9.0.2~dev5-4.9.4 | 9.0.2~dev5-4.9.4 | Jan 3, 2020 | libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow. | ||
| CVE-2020-5313 | — | < 9.0.2~dev5-4.9.4 | 9.0.2~dev5-4.9.4 | Jan 3, 2020 | libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow. | ||
| CVE-2019-16789 | — | < 9.0.2~dev5-4.9.4 | 9.0.2~dev5-4.9.4 | Dec 26, 2019 | In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests contain | ||
| CVE-2019-16785 | — | < 9.0.2~dev5-4.9.4 | 9.0.2~dev5-4.9.4 | Dec 20, 2019 | Waitress through version 1.3.1 implemented a "MAY" part of the RFC7230 which states: "Although the line terminator for the start-line and header fields is the sequence CRLF, a recipient MAY recognize a single LF as a line terminator and ignore any preceding CR." Unfortunately if | ||
| CVE-2019-16786 | — | < 9.0.2~dev5-4.9.4 | 9.0.2~dev5-4.9.4 | Dec 20, 2019 | Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separ | ||
| CVE-2019-19844 | — | < 9.0.2~dev5-4.9.4 | 9.0.2~dev5-4.9.4 | Dec 18, 2019 | Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token fo |
- CVE-2020-10743Jun 2, 2021affected < 9.0.2~dev5-4.9.4fixed 9.0.2~dev5-4.9.4
It was discovered that OpenShift Container Platform's (OCP) distribution of Kibana could open in an iframe, which made it possible to intercept and manipulate requests. This flaw allows an attacker to trick a user into performing arbitrary actions in OCP's distribution of Kibana,
- CVE-2020-13379Jun 3, 2020affected < 9.0.2~dev5-4.9.4fixed 9.0.2~dev5-4.9.4
The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information abo
- CVE-2020-13596Jun 3, 2020affected < 9.0.2~dev5-4.9.4fixed 9.0.2~dev5-4.9.4
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack.
- CVE-2020-13254Jun 3, 2020affected < 9.0.2~dev5-4.9.4fixed 9.0.2~dev5-4.9.4
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage.
- CVE-2020-11077May 22, 2020affected < 9.0.2~dev5-4.9.4fixed 9.0.2~dev5-4.9.4
In Puma (RubyGem) before 4.3.5 and 3.12.6, a client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mis
- CVE-2020-11076May 22, 2020affected < 9.0.2~dev5-4.9.4fixed 9.0.2~dev5-4.9.4
In Puma (RubyGem) before 4.3.4 and 3.12.5, an attacker could smuggle an HTTP response, by using an invalid transfer-encoding header. The problem has been fixed in Puma 3.12.5 and Puma 4.3.4.
- CVE-2020-8151May 12, 2020affected < 9.0.2~dev5-4.9.4fixed 9.0.2~dev5-4.9.4
There is a possible information disclosure issue in Active Resource <v5.1.1 that could allow an attacker to create specially crafted requests to access data in an unexpected way and possibly leak information.
- CVE-2020-10663Apr 28, 2020affected < 9.0.2~dev5-4.9.4fixed 9.0.2~dev5-4.9.4
The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically,
- CVE-2020-12052Apr 27, 2020affected < 9.0.2~dev5-4.9.4fixed 9.0.2~dev5-4.9.4
Grafana version < 6.7.3 is vulnerable for annotation popup XSS.
- CVE-2018-17954Apr 3, 2020affected < 9.0.2~dev5-4.6.1fixed 9.0.2~dev5-4.6.1
An Improper Privilege Management in crowbar of SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud 9, SUSE OpenStack Cloud Crowbar 8, SUSE OpenStack Cloud Crowbar 9 allows root users on any crowbar managed node to cause become root on any other node. This issue a
- CVE-2020-5247Feb 28, 2020affected < 9.0.2~dev5-4.9.4fixed 9.0.2~dev5-4.9.4
In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entir
- CVE-2019-16792Jan 22, 2020affected < 9.0.2~dev5-4.9.4fixed 9.0.2~dev5-4.9.4
Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally.
- CVE-2020-5390Jan 13, 2020affected < 9.0.2~dev5-4.9.4fixed 9.0.2~dev5-4.9.4
PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus
- CVE-2019-19911Jan 5, 2020affected < 9.0.2~dev5-4.9.4fixed 9.0.2~dev5-4.9.4
There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows running 32-bit Python, this results in an OverflowError or MemoryError due to the 2 GB limit. Ho
- CVE-2020-5312Jan 3, 2020affected < 9.0.2~dev5-4.9.4fixed 9.0.2~dev5-4.9.4
libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow.
- CVE-2020-5313Jan 3, 2020affected < 9.0.2~dev5-4.9.4fixed 9.0.2~dev5-4.9.4
libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow.
- CVE-2019-16789Dec 26, 2019affected < 9.0.2~dev5-4.9.4fixed 9.0.2~dev5-4.9.4
In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests contain
- CVE-2019-16785Dec 20, 2019affected < 9.0.2~dev5-4.9.4fixed 9.0.2~dev5-4.9.4
Waitress through version 1.3.1 implemented a "MAY" part of the RFC7230 which states: "Although the line terminator for the start-line and header fields is the sequence CRLF, a recipient MAY recognize a single LF as a line terminator and ignore any preceding CR." Unfortunately if
- CVE-2019-16786Dec 20, 2019affected < 9.0.2~dev5-4.9.4fixed 9.0.2~dev5-4.9.4
Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separ
- CVE-2019-19844Dec 18, 2019affected < 9.0.2~dev5-4.9.4fixed 9.0.2~dev5-4.9.4
Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token fo
Page 1 of 2