VYPR

rpm package

suse/python-urllib3&distro=HPE Helion OpenStack 8

pkg:rpm/suse/python-urllib3&distro=HPE%20Helion%20OpenStack%208

Vulnerabilities (73)

  • CVE-2018-16837Oct 23, 2018
    affected < 1.22-5.12.1fixed 1.22-5.12.1

    Ansible "User" module leaks any data which is passed on as a parameter to ssh-keygen. This could lean in undesirable situations such as passphrases credentials passed as a parameter for the ssh-keygen executable. Showing those credentials in clear text form for every user which h

  • CVE-2018-18074Oct 9, 2018
    affected < 1.22-3.20.1fixed 1.22-3.20.1

    The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.

  • CVE-2018-15727Aug 29, 2018
    affected < 1.22-5.9.3fixed 1.22-5.9.3

    Grafana 2.x, 3.x, and 4.x before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid "remember me" cookie knowing only a username of an LDAP or OAuth user.

  • CVE-2016-8614Jul 31, 2018
    affected < 1.22-5.12.1fixed 1.22-5.12.1

    A flaw was found in Ansible before version 2.2.0. The apt_key module does not properly verify key fingerprints, allowing remote adversary to create an OpenPGP key which matches the short key ID and inject this key instead of the correct key.

  • CVE-2016-8628Jul 31, 2018
    affected < 1.22-5.12.1fixed 1.22-5.12.1

    Ansible before version 2.2.0 fails to properly sanitize fact variables sent from the Ansible controller. An attacker with the ability to create special variables on the controller could execute arbitrary commands on Ansible clients as the user Ansible runs as.

  • CVE-2016-8647Jul 26, 2018
    affected < 1.22-5.12.1fixed 1.22-5.12.1

    An input validation vulnerability was found in Ansible's mysql_user module before 2.2.1.0, which may fail to correctly change a password in certain circumstances. Thus the previous password would still be active when it should have been changed.

  • CVE-2018-10875Jul 13, 2018
    affected < 1.22-5.12.1fixed 1.22-5.12.1

    A flaw was found in ansible. ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing the attacker to execute arbitrary code.

  • CVE-2017-7466Jun 22, 2018
    affected < 1.22-5.12.1fixed 1.22-5.12.1

    Ansible before version 2.3 has an input validation vulnerability in the handling of data sent from client systems. An attacker with control over a client system being managed by Ansible, and the ability to send facts back to the Ansible server, could use this flaw to execute arbi

  • CVE-2016-9587Apr 24, 2018
    affected < 1.22-5.12.1fixed 1.22-5.12.1

    Ansible before versions 2.1.4, 2.2.1 is vulnerable to an improper input validation in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use thi

  • CVE-2017-7550CriNov 21, 2017
    affected < 1.22-5.12.1fixed 1.22-5.12.1

    A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host's logs. This flaw was fixed by not allowing passwords t

  • CVE-2016-10127CriMar 3, 2017
    affected < 1.22-5.9.3fixed 1.22-5.9.3

    PySAML2 allows remote attackers to conduct XML external entity (XXE) attacks via a crafted SAML XML request or response.

  • CVE-2015-3448Apr 29, 2015
    affected < 1.22-5.9.3fixed 1.22-5.9.3

    REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.

  • CVE-2015-2296Mar 18, 2015
    affected < 1.22-3.20.1fixed 1.22-3.20.1

    The resolve_redirects function in sessions.py in requests 2.1.0 through 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a redirect.

Page 4 of 4