VYPR

rpm package

suse/python-pysaml2&distro=SUSE OpenStack Cloud 8

pkg:rpm/suse/python-pysaml2&distro=SUSE%20OpenStack%20Cloud%208

Vulnerabilities (48)

  • CVE-2020-10663Apr 28, 2020
    affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1

    The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically,

  • CVE-2020-12052Apr 27, 2020
    affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1

    Grafana version < 6.7.3 is vulnerable for annotation popup XSS.

  • CVE-2019-16792Jan 22, 2020
    affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1

    Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally.

  • CVE-2020-5390Jan 13, 2020
    affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1

    PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus

  • CVE-2019-19911Jan 5, 2020
    affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1

    There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows running 32-bit Python, this results in an OverflowError or MemoryError due to the 2 GB limit. Ho

  • CVE-2020-5312Jan 3, 2020
    affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1

    libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow.

  • CVE-2020-5313Jan 3, 2020
    affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1

    libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow.

  • CVE-2019-16789Dec 26, 2019
    affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1

    In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests contain

  • CVE-2019-16785Dec 20, 2019
    affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1

    Waitress through version 1.3.1 implemented a "MAY" part of the RFC7230 which states: "Although the line terminator for the start-line and header fields is the sequence CRLF, a recipient MAY recognize a single LF as a line terminator and ignore any preceding CR." Unfortunately if

  • CVE-2019-16786Dec 20, 2019
    affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1

    Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separ

  • CVE-2019-18874Nov 12, 2019
    affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1

    psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object.

  • CVE-2019-16865Oct 4, 2019
    affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1

    An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image.

  • CVE-2019-15043Sep 3, 2019
    affected < 4.0.2-5.3.3fixed 4.0.2-5.3.3

    In Grafana 2.x through 6.x before 6.3.4, parts of the HTTP API allow unauthenticated use. This makes it possible to run a denial of service attack against the server running Grafana.

  • CVE-2019-5477Aug 16, 2019
    affected < 4.0.2-5.3.3fixed 4.0.2-5.3.3

    A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input a

  • CVE-2019-1010083Jul 17, 2019
    affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1

    The Pallets Project Flask before 1.0 is affected by: unexpected memory usage. The impact is: denial of service. The attack vector is: crafted encoded JSON data. The fixed version is: 1. NOTE: this may overlap CVE-2018-1000656.

  • CVE-2019-13611Jul 15, 2019
    affected < 4.0.2-5.3.3fixed 4.0.2-5.3.3

    An issue was discovered in python-engineio through 3.8.2. There is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability that allows attackers to make WebSocket connections to a server by using a victim's credentials, because the Origin header is not restricted.

  • CVE-2019-2628Apr 23, 2019
    affected < 4.0.2-5.3.3fixed 4.0.2-5.3.3

    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compr

  • CVE-2019-2627Apr 23, 2019
    affected < 4.0.2-5.3.3fixed 4.0.2-5.3.3

    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with networ

  • CVE-2019-2614Apr 23, 2019
    affected < 4.0.2-5.3.3fixed 4.0.2-5.3.3

    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with network acces

  • CVE-2019-3828Mar 27, 2019
    affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1

    Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.