Show filters
260 Total Results
Displaying 51-60 of 260
Sort by:
Attacker Value
Unknown
CVE-2021-3620
Disclosure Date: March 03, 2022 (last updated October 07, 2023)
A flaw was found in Ansible Engine's ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality.
0
Attacker Value
Unknown
CVE-2021-3654
Disclosure Date: March 02, 2022 (last updated October 07, 2023)
A vulnerability was found in openstack-nova's console proxy, noVNC. By crafting a malicious URL, noVNC could be made to redirect to any desired URL.
0
Attacker Value
Unknown
CVE-2021-3930
Disclosure Date: February 18, 2022 (last updated October 07, 2023)
An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition.
0
Attacker Value
Unknown
CVE-2020-25717
Disclosure Date: February 18, 2022 (last updated October 07, 2023)
A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.
0
Attacker Value
Unknown
CVE-2016-2124
Disclosure Date: February 18, 2022 (last updated October 07, 2023)
A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.
0
Attacker Value
Unknown
CVE-2020-1690
Disclosure Date: June 07, 2021 (last updated February 22, 2025)
An improper authorization flaw was discovered in openstack-selinux's applied policy where it does not prevent a non-root user in a container from privilege escalation. A non-root attacker in one or more Red Hat OpenStack (RHOSP) containers could send messages to the dbus. With access to the dbus, the attacker could start or stop services, possibly causing a denial of service. Versions before openstack-selinux 0.8.24 are affected.
0
Attacker Value
Unknown
CVE-2019-12067
Disclosure Date: June 02, 2021 (last updated February 22, 2025)
The ahci_commit_buf function in ide/ahci.c in QEMU allows attackers to cause a denial of service (NULL dereference) when the command header 'ad->cur_cmd' is null.
0
Attacker Value
Unknown
CVE-2021-20267
Disclosure Date: May 28, 2021 (last updated February 22, 2025)
A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. Only deployments using the Open vSwitch driver are affected. Source: OpenStack project. Versions before openstack-neutron 15.3.3, openstack-neutron 16.3.1 and openstack-neutron 17.1.1 are affected.
0
Attacker Value
Unknown
CVE-2021-31918
Disclosure Date: May 06, 2021 (last updated February 22, 2025)
A flaw was found in tripleo-ansible version as shipped in Red Hat Openstack 16.1. The Ansible log file is readable to all users during stack update and creation. The highest threat from this vulnerability is to data confidentiality.
0
Attacker Value
Unknown
CVE-2021-20270
Disclosure Date: March 23, 2021 (last updated February 22, 2025)
An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only contains the "exception" keyword.
0