rpm package
suse/venv-openstack-monasca&distro=SUSE OpenStack Cloud 9
pkg:rpm/suse/venv-openstack-monasca&distro=SUSE%20OpenStack%20Cloud%209
Vulnerabilities (100)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2019-11596 | — | < 2.7.1~dev10-3.15.1 | 2.7.1~dev10-3.15.1 | Apr 29, 2019 | In memcached before 1.5.14, a NULL pointer dereference was found in the "lru mode" and "lru temp_ttl" commands. This causes a denial of service when parsing crafted lru command messages in process_lru_command in memcached.c. | ||
| CVE-2019-11324 | — | < 2.7.1~dev10-3.7.2 | 2.7.1~dev10-3.7.2 | Apr 18, 2019 | The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is | ||
| CVE-2019-11236 | — | < 2.7.1~dev10-3.7.2 | 2.7.1~dev10-3.7.2 | Apr 15, 2019 | In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter. | ||
| CVE-2019-11068 | — | < 2.7.1~dev10-3.3.1 | 2.7.1~dev10-3.3.1 | Apr 10, 2019 | libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded. | ||
| CVE-2016-10745 | — | < 2.7.1~dev10-3.19.2 | 2.7.1~dev10-3.19.2 | Apr 8, 2019 | In Pallets Jinja before 2.8.1, str.format allows a sandbox escape. | ||
| CVE-2019-10906 | — | < 2.7.1~dev10-3.19.2 | 2.7.1~dev10-3.19.2 | Apr 6, 2019 | In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape. | ||
| CVE-2019-10876 | — | < 2.7.1~dev10-3.3.1 | 2.7.1~dev10-3.3.1 | Apr 5, 2019 | An issue was discovered in OpenStack Neutron 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By creating two security groups with separate/overlapping port ranges, an authenticated user may prevent Neutron from being able to configure networks on any compute nodes | ||
| CVE-2019-3828 | — | < 2.7.1~dev10-3.17.3 | 2.7.1~dev10-3.17.3 | Mar 27, 2019 | Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path. | ||
| CVE-2019-3871 | — | < 2.7.1~dev10-3.11.3 | 2.7.1~dev10-3.11.3 | Mar 21, 2019 | A vulnerability was found in PowerDNS Authoritative Server before 4.0.7 and before 4.1.7. An insufficient validation of data coming from the user when building a HTTP request from a DNS query in the HTTP Connector of the Remote backend, allowing a remote user to cause a denial of | ||
| CVE-2019-9740 | — | < 2.7.1~dev10-3.7.2 | 2.7.1~dev10-3.7.2 | Mar 13, 2019 | An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string | ||
| CVE-2019-9735 | — | < 2.7.1~dev10-3.7.2 | 2.7.1~dev10-3.7.2 | Mar 13, 2019 | An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example, | ||
| CVE-2019-7164 | — | < 2.7.1~dev10-3.7.2 | 2.7.1~dev10-3.7.2 | Feb 20, 2019 | SQLAlchemy through 1.2.17 and 1.3.x through 1.3.0b2 allows SQL Injection via the order_by parameter. | ||
| CVE-2019-8341 | — | < 2.7.1~dev10-3.19.2 | 2.7.1~dev10-3.19.2 | Feb 15, 2019 | An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: | ||
| CVE-2019-7548 | — | < 2.7.1~dev10-3.7.2 | 2.7.1~dev10-3.7.2 | Feb 6, 2019 | SQLAlchemy 1.2.17 has SQL Injection when the group_by parameter can be controlled. | ||
| CVE-2018-19039 | — | < 2.7.1~dev10-3.3.1 | 2.7.1~dev10-3.3.1 | Dec 13, 2018 | Grafana before 4.6.5 and 5.x before 5.3.3 allows remote authenticated users to read arbitrary files by leveraging Editor or Admin permissions. | ||
| CVE-2018-19787 | — | < 2.7.1~dev10-3.37.1 | 2.7.1~dev10-3.37.1 | Dec 2, 2018 | An issue was discovered in lxml before 4.2.5. lxml/html/clean.py in the lxml.html.clean module does not remove javascript: URLs that use escaping, allowing a remote attacker to conduct XSS attacks, as demonstrated by "j a v a s c r i p t:" in Internet Explorer. This is a similar | ||
| CVE-2017-11481 | Med | 6.1 | < 2.7.1~dev10-3.21.1 | 2.7.1~dev10-3.21.1 | Dec 8, 2017 | Kibana versions prior to 6.0.1 and 5.6.5 had a cross-site scripting (XSS) vulnerability via URL fields that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users. | |
| CVE-2017-17051 | Hig | 8.6 | < 2.7.1~dev10-3.7.2 | 2.7.1~dev10-3.7.2 | Dec 5, 2017 | An issue was discovered in the default FilterScheduler in OpenStack Nova 16.0.3. By repeatedly rebuilding an instance with new images, an authenticated user may consume untracked resources on a hypervisor host leading to a denial of service, aka doubled resource allocations. This | |
| CVE-2017-11499 | Hig | 7.5 | < 2.7.1~dev10-3.21.1 | 2.7.1~dev10-3.21.1 | Jul 25, 2017 | Node.js v4.0 through v4.8.3, all versions of v5.x, v6.0 through v6.11.0, v7.0 through v7.10.0, and v8.0 through v8.1.3 was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building | |
| CVE-2015-3448 | — | < 2.7.1~dev10-3.7.2 | 2.7.1~dev10-3.7.2 | Apr 29, 2015 | REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log. |
- CVE-2019-11596Apr 29, 2019affected < 2.7.1~dev10-3.15.1fixed 2.7.1~dev10-3.15.1
In memcached before 1.5.14, a NULL pointer dereference was found in the "lru mode" and "lru temp_ttl" commands. This causes a denial of service when parsing crafted lru command messages in process_lru_command in memcached.c.
- CVE-2019-11324Apr 18, 2019affected < 2.7.1~dev10-3.7.2fixed 2.7.1~dev10-3.7.2
The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is
- CVE-2019-11236Apr 15, 2019affected < 2.7.1~dev10-3.7.2fixed 2.7.1~dev10-3.7.2
In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.
- CVE-2019-11068Apr 10, 2019affected < 2.7.1~dev10-3.3.1fixed 2.7.1~dev10-3.3.1
libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.
- CVE-2016-10745Apr 8, 2019affected < 2.7.1~dev10-3.19.2fixed 2.7.1~dev10-3.19.2
In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.
- CVE-2019-10906Apr 6, 2019affected < 2.7.1~dev10-3.19.2fixed 2.7.1~dev10-3.19.2
In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape.
- CVE-2019-10876Apr 5, 2019affected < 2.7.1~dev10-3.3.1fixed 2.7.1~dev10-3.3.1
An issue was discovered in OpenStack Neutron 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By creating two security groups with separate/overlapping port ranges, an authenticated user may prevent Neutron from being able to configure networks on any compute nodes
- CVE-2019-3828Mar 27, 2019affected < 2.7.1~dev10-3.17.3fixed 2.7.1~dev10-3.17.3
Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.
- CVE-2019-3871Mar 21, 2019affected < 2.7.1~dev10-3.11.3fixed 2.7.1~dev10-3.11.3
A vulnerability was found in PowerDNS Authoritative Server before 4.0.7 and before 4.1.7. An insufficient validation of data coming from the user when building a HTTP request from a DNS query in the HTTP Connector of the Remote backend, allowing a remote user to cause a denial of
- CVE-2019-9740Mar 13, 2019affected < 2.7.1~dev10-3.7.2fixed 2.7.1~dev10-3.7.2
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string
- CVE-2019-9735Mar 13, 2019affected < 2.7.1~dev10-3.7.2fixed 2.7.1~dev10-3.7.2
An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example,
- CVE-2019-7164Feb 20, 2019affected < 2.7.1~dev10-3.7.2fixed 2.7.1~dev10-3.7.2
SQLAlchemy through 1.2.17 and 1.3.x through 1.3.0b2 allows SQL Injection via the order_by parameter.
- CVE-2019-8341Feb 15, 2019affected < 2.7.1~dev10-3.19.2fixed 2.7.1~dev10-3.19.2
An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE:
- CVE-2019-7548Feb 6, 2019affected < 2.7.1~dev10-3.7.2fixed 2.7.1~dev10-3.7.2
SQLAlchemy 1.2.17 has SQL Injection when the group_by parameter can be controlled.
- CVE-2018-19039Dec 13, 2018affected < 2.7.1~dev10-3.3.1fixed 2.7.1~dev10-3.3.1
Grafana before 4.6.5 and 5.x before 5.3.3 allows remote authenticated users to read arbitrary files by leveraging Editor or Admin permissions.
- CVE-2018-19787Dec 2, 2018affected < 2.7.1~dev10-3.37.1fixed 2.7.1~dev10-3.37.1
An issue was discovered in lxml before 4.2.5. lxml/html/clean.py in the lxml.html.clean module does not remove javascript: URLs that use escaping, allowing a remote attacker to conduct XSS attacks, as demonstrated by "j a v a s c r i p t:" in Internet Explorer. This is a similar
- affected < 2.7.1~dev10-3.21.1fixed 2.7.1~dev10-3.21.1
Kibana versions prior to 6.0.1 and 5.6.5 had a cross-site scripting (XSS) vulnerability via URL fields that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users.
- affected < 2.7.1~dev10-3.7.2fixed 2.7.1~dev10-3.7.2
An issue was discovered in the default FilterScheduler in OpenStack Nova 16.0.3. By repeatedly rebuilding an instance with new images, an authenticated user may consume untracked resources on a hypervisor host leading to a denial of service, aka doubled resource allocations. This
- affected < 2.7.1~dev10-3.21.1fixed 2.7.1~dev10-3.21.1
Node.js v4.0 through v4.8.3, all versions of v5.x, v6.0 through v6.11.0, v7.0 through v7.10.0, and v8.0 through v8.1.3 was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building
- CVE-2015-3448Apr 29, 2015affected < 2.7.1~dev10-3.7.2fixed 2.7.1~dev10-3.7.2
REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.
Page 5 of 5