rpm package
suse/venv-openstack-cinder&distro=SUSE OpenStack Cloud 9
pkg:rpm/suse/venv-openstack-cinder&distro=SUSE%20OpenStack%20Cloud%209
Vulnerabilities (105)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2018-19787 | — | < 13.0.10~dev24-3.38.1 | 13.0.10~dev24-3.38.1 | Dec 2, 2018 | An issue was discovered in lxml before 4.2.5. lxml/html/clean.py in the lxml.html.clean module does not remove javascript: URLs that use escaping, allowing a remote attacker to conduct XSS attacks, as demonstrated by "j a v a s c r i p t:" in Internet Explorer. This is a similar | ||
| CVE-2017-11481 | Med | 6.1 | < 13.0.10~dev20-3.26.1 | 13.0.10~dev20-3.26.1 | Dec 8, 2017 | Kibana versions prior to 6.0.1 and 5.6.5 had a cross-site scripting (XSS) vulnerability via URL fields that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users. | |
| CVE-2017-17051 | Hig | 8.6 | < 13.0.7~dev3-3.7.2 | 13.0.7~dev3-3.7.2 | Dec 5, 2017 | An issue was discovered in the default FilterScheduler in OpenStack Nova 16.0.3. By repeatedly rebuilding an instance with new images, an authenticated user may consume untracked resources on a hypervisor host leading to a denial of service, aka doubled resource allocations. This | |
| CVE-2017-11499 | Hig | 7.5 | < 13.0.10~dev20-3.26.1 | 13.0.10~dev20-3.26.1 | Jul 25, 2017 | Node.js v4.0 through v4.8.3, all versions of v5.x, v6.0 through v6.11.0, v7.0 through v7.10.0, and v8.0 through v8.1.3 was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building | |
| CVE-2015-3448 | — | < 13.0.7~dev3-3.7.2 | 13.0.7~dev3-3.7.2 | Apr 29, 2015 | REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log. |
- CVE-2018-19787Dec 2, 2018affected < 13.0.10~dev24-3.38.1fixed 13.0.10~dev24-3.38.1
An issue was discovered in lxml before 4.2.5. lxml/html/clean.py in the lxml.html.clean module does not remove javascript: URLs that use escaping, allowing a remote attacker to conduct XSS attacks, as demonstrated by "j a v a s c r i p t:" in Internet Explorer. This is a similar
- affected < 13.0.10~dev20-3.26.1fixed 13.0.10~dev20-3.26.1
Kibana versions prior to 6.0.1 and 5.6.5 had a cross-site scripting (XSS) vulnerability via URL fields that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users.
- affected < 13.0.7~dev3-3.7.2fixed 13.0.7~dev3-3.7.2
An issue was discovered in the default FilterScheduler in OpenStack Nova 16.0.3. By repeatedly rebuilding an instance with new images, an authenticated user may consume untracked resources on a hypervisor host leading to a denial of service, aka doubled resource allocations. This
- affected < 13.0.10~dev20-3.26.1fixed 13.0.10~dev20-3.26.1
Node.js v4.0 through v4.8.3, all versions of v5.x, v6.0 through v6.11.0, v7.0 through v7.10.0, and v8.0 through v8.1.3 was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building
- CVE-2015-3448Apr 29, 2015affected < 13.0.7~dev3-3.7.2fixed 13.0.7~dev3-3.7.2
REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.
Page 6 of 6