Show filters
257 Total Results
Displaying 21-30 of 257
Sort by:
Attacker Value
Unknown

CVE-2021-3585

Disclosure Date: August 26, 2022 (last updated October 08, 2023)
A flaw was found in openstack-tripleo-heat-templates. Plain passwords from RHSM exist in the logs during OSP13 deployment with subscription-manager.
Attacker Value
Unknown

CVE-2021-3563

Disclosure Date: August 26, 2022 (last updated October 08, 2023)
A flaw was found in openstack-keystone. Only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data confidentiality and integrity.
Attacker Value
Unknown

CVE-2022-37394

Disclosure Date: August 03, 2022 (last updated October 08, 2023)
An issue was discovered in OpenStack Nova before 23.2.2, 24.x before 24.1.2, and 25.x before 25.0.2. By creating a neutron port with the direct vnic_type, creating an instance bound to that port, and then changing the vnic_type of the bound port to macvtap, an authenticated user may cause the compute service to fail to restart, resulting in a possible denial of service. Only Nova deployments configured with SR-IOV are affected.
Attacker Value
Unknown

CVE-2021-4180

Disclosure Date: March 23, 2022 (last updated October 07, 2023)
An information exposure flaw in openstack-tripleo-heat-templates allows an external user to discover the internal IP or hostname. An attacker could exploit this by checking the www_authenticate_uri parameter (which is visible to all end users) in configuration files. This would give sensitive information which may aid in additional system exploitation. This flaw affects openstack-tripleo-heat-templates versions prior to 11.6.1.
Attacker Value
Unknown

CVE-2021-3654

Disclosure Date: March 02, 2022 (last updated October 07, 2023)
A vulnerability was found in openstack-nova's console proxy, noVNC. By crafting a malicious URL, noVNC could be made to redirect to any desired URL.
Attacker Value
Unknown

CVE-2021-40797

Disclosure Date: September 08, 2021 (last updated November 28, 2024)
An issue was discovered in the routes middleware in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. By making API requests involving nonexistent controllers, an authenticated user may cause the API worker to consume increasing amounts of memory, resulting in API performance degradation or denial of service.
Attacker Value
Unknown

CVE-2021-40085

Disclosure Date: August 31, 2021 (last updated November 28, 2024)
An issue was discovered in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. Authenticated attackers can reconfigure dnsmasq via a crafted extra_dhcp_opts value.
Attacker Value
Unknown

CVE-2021-38598

Disclosure Date: August 23, 2021 (last updated November 28, 2024)
OpenStack Neutron before 16.4.1, 17.x before 17.1.3, and 18.0.0 allows hardware address impersonation when the linuxbridge driver with ebtables-nft is used on a Netfilter-based platform. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the hardware addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations.
Attacker Value
Unknown

CVE-2021-38155

Disclosure Date: August 06, 2021 (last updated January 22, 2024)
OpenStack Keystone 10.x through 16.x before 16.0.2, 17.x before 17.0.1, 18.x before 18.0.1, and 19.x before 19.0.1 allows information disclosure during account locking (related to PCI DSS features). By guessing the name of an account and failing to authenticate multiple times, any unauthenticated actor could both confirm the account exists and obtain that account's corresponding UUID, which might be leveraged for other unrelated attacks. All deployments enabling security_compliance.lockout_failure_attempts are affected.
Attacker Value
Unknown

CVE-2017-8761

Disclosure Date: June 02, 2021 (last updated November 29, 2024)
In OpenStack Swift through 2.10.1, 2.11.0 through 2.13.0, and 2.14.0, the proxy-server logs full tempurl paths, potentially leaking reusable tempurl signatures to anyone with read access to these logs. All Swift deployments using the tempurl middleware are affected.