Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat openstack platform 13.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-3637
An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were...
Redhat Openstack Platform 13.0
Redhat Openstack Platform 16.2
NA
CVE-2023-3354
A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake ph...
Qemu Qemu
Qemu Qemu 8.1.0
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 8.0
Redhat Openstack Platform 13.0
Redhat Enterprise Linux 9.0
Fedoraproject Fedora 38
NA
CVE-2023-2088
A flaw was found in OpenStack due to an inconsistency between Cinder and Nova. This issue can be triggered intentionally or by accident. A remote, authenticated attacker could exploit this vulnerability by detaching one of their volumes from Cinder. The highest impact is to confi...
Redhat Openstack -
NA
CVE-2022-3277
An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were...
Redhat Openstack Platform 16.1
Redhat Openstack Platform 13.0
Redhat Openstack Platform 16.2
Openstack Neutron
NA
CVE-2022-3100
A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.
Openstack Barbican -
Redhat Openstack 16.1
Redhat Openstack 16.2
Redhat Openstack For Ibm Power 16.1
Redhat Openstack 13
Redhat Openstack For Ibm Power 13
Redhat Openstack For Ibm Power 16.2
Redhat Openstack 17
Redhat Openstack Platform 13.0
NA
CVE-2022-23451
An authorization flaw was found in openstack-barbican. The default policy rules for the secret metadata API allowed any authenticated user to add, modify, or delete metadata from any secret regardless of ownership. This flaw allows an attacker on the network to modify or delete p...
Openstack Barbican
Redhat Openstack Platform 16.1
Redhat Openstack Platform 13.0
Redhat Openstack Platform 16.2
NA
CVE-2022-2132
A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote malicious user to cause a denial of service triggered by sending a crafted Vhost header to DPDK.
Dpdk Data Plane Development Kit
Fedoraproject Fedora 36
Debian Debian Linux 10.0
Redhat Enterprise Linux 7.0
Redhat Virtualization 4.0
Redhat Enterprise Linux Fast Datapath 7.0
Redhat Enterprise Linux 8.0
Redhat Openshift Container Platform 4.0
Redhat Openstack Platform 13.0
Redhat Enterprise Linux Fast Datapath 8.0
Redhat Enterprise Linux 9.0
Redhat Enterprise Linux Fast Datapath 9.0
NA
CVE-2021-3563
A flaw was found in openstack-keystone. Only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data confidentiality and integri...
Openstack Keystone
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Redhat Openstack Platform 16.1
Redhat Openstack Platform 13.0
Redhat Openstack Platform 10.0
Redhat Openstack Platform 16.2
NA
CVE-2021-3979
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks...
Redhat Ceph Storage 3.0
Redhat Openstack Platform 13.0
Redhat Openshift Container Storage 4.0
Redhat Openshift Data Foundation 4.0
Redhat Ceph Storage For Ibm Z Systems 4.0
Redhat Ceph Storage 4.3
Redhat Ceph Storage 5.1
Redhat Ceph Storage 4.0
Redhat Ceph Storage 5.0
Redhat Ceph Storage For Power 4.0
Fedoraproject Fedora 35
Fedoraproject Fedora 37
NA
CVE-2020-14394
An infinite loop flaw was found in the USB xHCI controller emulation of QEMU while computing the length of the Transfer Request Block (TRB) Ring. This flaw allows a privileged guest user to hang the QEMU process on the host, resulting in a denial of service.
Qemu Qemu 6.1.50
Fedoraproject Fedora 33
Fedoraproject Extra Packages For Enterprise Linux 7.0
Fedoraproject Fedora 37
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 5.0
Redhat Enterprise Linux 8.0
Redhat Openstack Platform 13.0
Redhat Openstack Platform 10.0
Redhat Enterprise Linux 9.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2