VYPR

rpm package

suse/python-py&distro=SUSE OpenStack Cloud 7

pkg:rpm/suse/python-py&distro=SUSE%20OpenStack%20Cloud%207

Vulnerabilities (41)

  • CVE-2021-33203Jun 8, 2021
    affected < 1.8.1-11.16.2fixed 1.8.1-11.16.2

    Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs te

  • CVE-2021-33571Jun 8, 2021
    affected < 1.8.1-11.16.2fixed 1.8.1-11.16.2

    In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4

  • CVE-2020-10743Jun 2, 2021
    affected < 1.8.1-11.12.1fixed 1.8.1-11.12.1

    It was discovered that OpenShift Container Platform's (OCP) distribution of Kibana could open in an iframe, which made it possible to intercept and manipulate requests. This flaw allows an attacker to trick a user into performing arbitrary actions in OCP's distribution of Kibana,

  • CVE-2021-31542May 5, 2021
    affected < 1.8.1-11.16.2fixed 1.8.1-11.16.2

    In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names.

  • CVE-2021-28658Apr 6, 2021
    affected < 1.8.1-11.16.2fixed 1.8.1-11.16.2

    In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability.

  • CVE-2021-27358Mar 18, 2021
    affected < 1.8.1-11.16.2fixed 1.8.1-11.16.2

    The snapshot feature in Grafana 6.7.3 through 7.4.1 can allow an unauthenticated remote attackers to trigger a Denial of Service via a remote API call if a commonly used configuration is set.

  • CVE-2019-25025Mar 5, 2021
    affected < 1.8.1-11.16.2fixed 1.8.1-11.16.2

    The activerecord-session_store (aka Active Record Session Store) component through 1.1.3 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid. Consequently, remote attackers can leverage timing discrepanci

  • CVE-2021-3281Feb 2, 2021
    affected < 1.8.1-11.16.2fixed 1.8.1-11.16.2

    In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.

  • CVE-2020-29651Dec 9, 2020
    affected < 1.8.1-11.16.2fixed 1.8.1-11.16.2

    A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

  • CVE-2020-13379Jun 3, 2020
    affected < 1.8.1-11.12.1fixed 1.8.1-11.12.1

    The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information abo

  • CVE-2020-13596Jun 3, 2020
    affected < 1.8.1-11.12.1fixed 1.8.1-11.12.1

    An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack.

  • CVE-2020-13254Jun 3, 2020
    affected < 1.8.1-11.12.1fixed 1.8.1-11.12.1

    An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage.

  • CVE-2020-11077May 22, 2020
    affected < 1.8.1-11.12.1fixed 1.8.1-11.12.1

    In Puma (RubyGem) before 4.3.5 and 3.12.6, a client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mis

  • CVE-2020-11076May 22, 2020
    affected < 1.8.1-11.12.1fixed 1.8.1-11.12.1

    In Puma (RubyGem) before 4.3.4 and 3.12.5, an attacker could smuggle an HTTP response, by using an invalid transfer-encoding header. The problem has been fixed in Puma 3.12.5 and Puma 4.3.4.

  • CVE-2020-8151May 12, 2020
    affected < 1.8.1-11.12.1fixed 1.8.1-11.12.1

    There is a possible information disclosure issue in Active Resource <v5.1.1 that could allow an attacker to create specially crafted requests to access data in an unexpected way and possibly leak information.

  • CVE-2020-10663Apr 28, 2020
    affected < 1.8.1-11.12.1fixed 1.8.1-11.12.1

    The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically,

  • CVE-2020-12052Apr 27, 2020
    affected < 1.8.1-11.12.1fixed 1.8.1-11.12.1

    Grafana version < 6.7.3 is vulnerable for annotation popup XSS.

  • CVE-2020-5247Feb 28, 2020
    affected < 1.8.1-11.12.1fixed 1.8.1-11.12.1

    In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entir

  • CVE-2019-16792Jan 22, 2020
    affected < 1.8.1-11.12.1fixed 1.8.1-11.12.1

    Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally.

  • CVE-2020-5390Jan 13, 2020
    affected < 1.8.1-11.12.1fixed 1.8.1-11.12.1

    PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus

Page 1 of 3