VYPR

rpm package

suse/python-Pillow&distro=SUSE OpenStack Cloud 7

pkg:rpm/suse/python-Pillow&distro=SUSE%20OpenStack%20Cloud%207

Vulnerabilities (58)

  • CVE-2018-18624Jun 2, 2020
    affected < 2.8.1-4.17.2fixed 2.8.1-4.17.2

    Grafana 5.3.1 has XSS via a column style on the "Dashboard > Table Panel" screen. NOTE: this issue exists because of an incomplete fix for CVE-2018-12099.

  • CVE-2018-18623Jun 2, 2020
    affected < 2.8.1-4.17.2fixed 2.8.1-4.17.2

    Grafana 5.3.1 has XSS via the "Dashboard > Text Panel" screen. NOTE: this issue exists because of an incomplete fix for CVE-2018-12099.

  • CVE-2020-11077May 22, 2020
    affected < 2.8.1-4.12.1fixed 2.8.1-4.12.1

    In Puma (RubyGem) before 4.3.5 and 3.12.6, a client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mis

  • CVE-2020-11076May 22, 2020
    affected < 2.8.1-4.12.1fixed 2.8.1-4.12.1

    In Puma (RubyGem) before 4.3.4 and 3.12.5, an attacker could smuggle an HTTP response, by using an invalid transfer-encoding header. The problem has been fixed in Puma 3.12.5 and Puma 4.3.4.

  • CVE-2020-10744May 15, 2020
    affected < 2.8.1-4.17.2fixed 2.8.1-4.17.2

    An incomplete fix was found for the fix of the flaw CVE-2020-1733 ansible: insecure temporary directory when running become_user from become directive. The provided fix is insufficient to prevent the race condition on systems using ACLs and FUSE filesystems. Ansible Engine 2.7.18

  • CVE-2020-8151May 12, 2020
    affected < 2.8.1-4.12.1fixed 2.8.1-4.12.1

    There is a possible information disclosure issue in Active Resource <v5.1.1 that could allow an attacker to create specially crafted requests to access data in an unexpected way and possibly leak information.

  • CVE-2020-10663Apr 28, 2020
    affected < 2.8.1-4.12.1fixed 2.8.1-4.12.1

    The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically,

  • CVE-2020-12052Apr 27, 2020
    affected < 2.8.1-4.12.1fixed 2.8.1-4.12.1

    Grafana version < 6.7.3 is vulnerable for annotation popup XSS.

  • CVE-2018-17954Apr 3, 2020
    affected < 2.8.1-4.17.2fixed 2.8.1-4.17.2

    An Improper Privilege Management in crowbar of SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud 9, SUSE OpenStack Cloud Crowbar 8, SUSE OpenStack Cloud Crowbar 9 allows root users on any crowbar managed node to cause become root on any other node. This issue a

  • CVE-2020-1733Mar 11, 2020
    affected < 2.8.1-4.17.2fixed 2.8.1-4.17.2

    A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is cr

  • CVE-2020-5247Feb 28, 2020
    affected < 2.8.1-4.12.1fixed 2.8.1-4.12.1

    In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entir

  • CVE-2019-16792Jan 22, 2020
    affected < 2.8.1-4.12.1fixed 2.8.1-4.12.1

    Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally.

  • CVE-2020-5390Jan 13, 2020
    affected < 2.8.1-4.12.1fixed 2.8.1-4.12.1

    PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus

  • CVE-2019-19911Jan 5, 2020
    affected < 2.8.1-4.12.1fixed 2.8.1-4.12.1

    There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows running 32-bit Python, this results in an OverflowError or MemoryError due to the 2 GB limit. Ho

  • CVE-2020-5312Jan 3, 2020
    affected < 2.8.1-4.12.1fixed 2.8.1-4.12.1

    libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow.

  • CVE-2020-5313Jan 3, 2020
    affected < 2.8.1-4.12.1fixed 2.8.1-4.12.1

    libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow.

  • CVE-2019-16789Dec 26, 2019
    affected < 2.8.1-4.12.1fixed 2.8.1-4.12.1

    In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests contain

  • CVE-2019-16785Dec 20, 2019
    affected < 2.8.1-4.12.1fixed 2.8.1-4.12.1

    Waitress through version 1.3.1 implemented a "MAY" part of the RFC7230 which states: "Although the line terminator for the start-line and header fields is the sequence CRLF, a recipient MAY recognize a single LF as a line terminator and ignore any preceding CR." Unfortunately if

  • CVE-2019-16786Dec 20, 2019
    affected < 2.8.1-4.12.1fixed 2.8.1-4.12.1

    Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separ

  • CVE-2019-19844Dec 18, 2019
    affected < 2.8.1-4.12.1fixed 2.8.1-4.12.1

    Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token fo