Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Gluster_storage
(Redhat)Repositories |
• git://git.openssl.org/openssl.git
• https://github.com/ansible/ansible |
#Vulnerabilities | 25 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2018-09-11 | CVE-2018-1127 | Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user. | Gluster_storage | 8.1 | ||
2015-11-25 | CVE-2015-5242 | OpenStack Swift-on-File (aka Swiftonfile) does not properly restrict use of the pickle Python module when loading metadata, which allows remote authenticated users to execute arbitrary code via a crafted extended attribute (xattrs). | Gluster_storage | N/A |