Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openstack vulnerabilities and exploits
(subscribe to this query)
5.8
CVSSv2
CVE-2020-1759
A vulnerability was found in Red Hat Ceph Storage 4 and Red Hat Openshift Container Storage 4.2 where, A nonce reuse vulnerability exists in the secure mode of the messenger v2 protocol, which can allow an malicious user to forge auth tags and potentially manipulate the data by l...
Redhat Openshift 4.2
Redhat Ceph Storage 4.0
Redhat Openstack 15
Linuxfoundation Ceph
Fedoraproject Fedora 31
5.8
CVSSv2
CVE-2019-0223
While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using TLS *even when configured to verify the peer certificate* while used with OpenS...
Apache Qpid
Redhat Jboss Amq Clients 2 -
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Server Aus 7.2
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server Tus 7.2
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Aus 6.6
Redhat Enterprise Linux Eus 6.7
Redhat Enterprise Linux Server Aus 6.5
Redhat Enterprise Linux Server Aus 6.4
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Server Tus 7.3
Redhat Enterprise Linux Server Aus 7.3
Redhat Enterprise Linux Server Aus 7.4
Redhat Enterprise Linux Server Tus 7.4
Redhat Enterprise Linux Eus 7.3
Redhat Enterprise Linux Eus 7.4
Redhat Enterprise Linux Eus 7.5
Redhat Satellite 6.3
1 Github repository
5.8
CVSSv2
CVE-2015-8466
Swift3 prior to 1.9 allows remote malicious users to conduct replay attacks via an Authorization request that lacks a Date header.
Fedoraproject Fedora 23
Openstack Swift3
5.8
CVSSv2
CVE-2013-6396
The OpenStack Python client library for Swift (python-swiftclient) 1.0 up to and including 1.9.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Openstack Swift 1.0.0
Openstack Swift 1.0.2
Openstack Swift 1.11.0
Openstack Swift 1.2.0
Openstack Swift 1.4.2
Openstack Swift 1.4.4
Openstack Swift 1.7.0
Openstack Swift 1.7.4
Openstack Swift 1.8.0
Openstack Swift 1.3.0
Openstack Swift 1.4.0
Openstack Swift 1.7.5
Openstack Swift 1.7.6
Openstack Swift 1.1.0
Openstack Swift 1.10.0
Openstack Swift 1.4.6
Openstack Swift 1.4.7
Openstack Swift 1.4.8
Openstack Swift 1.5.0
Openstack Swift 1.0.1
Openstack Swift 1.4.1
Openstack Swift 1.4.3
5.8
CVSSv2
CVE-2012-3540
Open redirect vulnerability in views/auth_forms.py in OpenStack Dashboard (Horizon) Essex (2012.1) allows remote malicious users to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the next parameter to auth/login/. NOTE: this issue was originally a...
Openstack Horizon 2012.1
5.5
CVSSv2
CVE-2021-20267
A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network, resulting in denial o...
Openstack Neutron 18.0.0
Openstack Neutron
Redhat Openstack Platform 16.1
Redhat Openstack Platform 13.0
Redhat Openstack Platform 10.0
Redhat Openstack Platform 16.2
5.5
CVSSv2
CVE-2020-12692
An issue exists in OpenStack Keystone prior to 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.
Openstack Keystone 16.0.0
Openstack Keystone
Canonical Ubuntu Linux 18.04
5.5
CVSSv2
CVE-2019-10156
A flaw exists in the way Ansible templating was implemented in versions prior to 2.6.18, 2.7.12 and 2.8.2, causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any variab...
Redhat Ansible
Redhat Openstack 13
Redhat Openstack 14
Debian Debian Linux 8.0
Debian Debian Linux 9.0
5.5
CVSSv2
CVE-2015-5251
OpenStack Image Service (Glance) prior to 2014.2.4 (juno) and 2015.1.x prior to 2015.1.2 (kilo) allow remote authenticated users to change the status of their images and bypass access restrictions via the HTTP x-image-meta-status header to images/*.
Openstack Image Registry And Delivery Service \\(glance\\)
Openstack Image Registry And Delivery Service \\(glance\\) 2015.1.1
Openstack Image Registry And Delivery Service \\(glance\\) 2015.1.0
5.5
CVSSv2
CVE-2013-4471
The Identity v3 API in OpenStack Dashboard (Horizon) prior to 2013.2 does not require the current password when changing passwords for user accounts, which makes it easier for remote malicious users to change a user password by leveraging the authentication token for that user.
Openstack Horizon
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »