Show filters
36 Total Results
Displaying 11-20 of 36
Sort by:
Attacker Value
Unknown

CVE-2023-6725

Disclosure Date: March 15, 2024 (last updated July 25, 2024)
An access-control flaw was found in the OpenStack Designate component where private configuration information including access keys to BIND were improperly made world readable. A malicious attacker with access to any container could exploit this flaw to access sensitive information.
0
Attacker Value
Unknown

CVE-2023-1636

Disclosure Date: September 24, 2023 (last updated October 08, 2023)
A vulnerability was found in OpenStack Barbican containers. This vulnerability is only applicable to deployments that utilize an all-in-one configuration. Barbican containers share the same CGROUP, USER, and NET namespace with the host system and other OpenStack services. If any service is compromised, it could gain access to the data transmitted to and from Barbican.
Attacker Value
Unknown

CVE-2023-1633

Disclosure Date: September 24, 2023 (last updated October 08, 2023)
A credentials leak flaw was found in OpenStack Barbican. This flaw allows a local authenticated attacker to read the configuration file, gaining access to sensitive credentials.
Attacker Value
Unknown

CVE-2023-1625

Disclosure Date: September 24, 2023 (last updated October 08, 2023)
An information leak was discovered in OpenStack heat. This issue could allow a remote, authenticated attacker to use the 'stack show' command to reveal parameters which are supposed to remain hidden. This has a low impact to the confidentiality, integrity, and availability of the system.
Attacker Value
Unknown

CVE-2023-1668

Disclosure Date: April 10, 2023 (last updated October 08, 2023)
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
Attacker Value
Unknown

CVE-2022-3146

Disclosure Date: March 23, 2023 (last updated October 08, 2023)
A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file. This issue leads to information disclosure of important configuration details from the OpenStack deployment.
Attacker Value
Unknown

CVE-2022-3101

Disclosure Date: March 23, 2023 (last updated October 08, 2023)
A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file, leading to information disclosure of important configuration details from the OpenStack deployment.
Attacker Value
Unknown

CVE-2022-4134

Disclosure Date: March 06, 2023 (last updated October 08, 2023)
A flaw was found in openstack-glance. This issue could allow a remote, authenticated attacker to tamper with images, compromising the integrity of virtual machines created using these modified images.
Attacker Value
Unknown

CVE-2022-3277

Disclosure Date: March 06, 2023 (last updated October 08, 2023)
An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service.
Attacker Value
Unknown

CVE-2022-3100

Disclosure Date: January 18, 2023 (last updated October 08, 2023)
A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.