VYPR

rpm package

suse/openstack-nova&distro=SUSE OpenStack Cloud 9

pkg:rpm/suse/openstack-nova&distro=SUSE%20OpenStack%20Cloud%209

Vulnerabilities (88)

  • CVE-2019-7164Feb 20, 2019
    affected < 18.2.2~dev9-3.7.2fixed 18.2.2~dev9-3.7.2

    SQLAlchemy through 1.2.17 and 1.3.x through 1.3.0b2 allows SQL Injection via the order_by parameter.

  • CVE-2019-8341Feb 15, 2019
    affected < 18.3.1~dev77-3.31.2fixed 18.3.1~dev77-3.31.2

    An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE:

  • CVE-2019-7548Feb 6, 2019
    affected < 18.2.2~dev9-3.7.2fixed 18.2.2~dev9-3.7.2

    SQLAlchemy 1.2.17 has SQL Injection when the group_by parameter can be controlled.

  • CVE-2018-19039Dec 13, 2018
    affected < 18.2.2~dev9-3.3.8fixed 18.2.2~dev9-3.3.8

    Grafana before 4.6.5 and 5.x before 5.3.3 allows remote authenticated users to read arbitrary files by leveraging Editor or Admin permissions.

  • CVE-2017-11481MedDec 8, 2017
    affected < 18.3.1~dev82-3.37.6fixed 18.3.1~dev82-3.37.6

    Kibana versions prior to 6.0.1 and 5.6.5 had a cross-site scripting (XSS) vulnerability via URL fields that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users.

  • CVE-2017-17051HigDec 5, 2017
    affected < 18.2.2~dev9-3.7.2fixed 18.2.2~dev9-3.7.2

    An issue was discovered in the default FilterScheduler in OpenStack Nova 16.0.3. By repeatedly rebuilding an instance with new images, an authenticated user may consume untracked resources on a hypervisor host leading to a denial of service, aka doubled resource allocations. This

  • CVE-2017-11499HigJul 25, 2017
    affected < 18.3.1~dev82-3.37.6fixed 18.3.1~dev82-3.37.6

    Node.js v4.0 through v4.8.3, all versions of v5.x, v6.0 through v6.11.0, v7.0 through v7.10.0, and v8.0 through v8.1.3 was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building

  • CVE-2015-3448Apr 29, 2015
    affected < 18.2.2~dev9-3.7.2fixed 18.2.2~dev9-3.7.2

    REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.

Page 5 of 5