CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

redhat

openstack

127 known vulnerabilities · sorted by CVSS score

CVE-2017-2637
CRITICAL9.9

A design flaw issue was found in the Red Hat OpenStack Platform director use of TripleO to enable libvirtd based live-migration. Libvirtd is deployed by default (by director) listening on 0.0.0.0 (all interfaces) with no-authentication or encryption. Anyone able to make a TCP connection to any compute host IP address, including 127.0.0.1, other loopback interface addresses, or in some cases possibly addresses that have been exposed beyond the management interface, could use this to open a virsh session to the libvirtd instance and gain control of virtual machine instances or possibly take over the host.

redhat / openstack+3
Network
Published Jul 26, 2018
Page 1 of 7
CVE-2013-2166
CRITICAL9.8

python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache encryption bypass

openstack / python-keystoneclient+5
Network
Published Dec 10, 2019
CVE-2013-2167
CRITICAL9.8

python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass

openstack / python-keystoneclient+4
Network
Published Dec 10, 2019
CVE-2018-11219
CRITICAL9.8

An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.

redislabs / redis+7
Network
Published Jun 17, 2018
CVE-2018-17963
CRITICAL9.8

qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.

qemu / qemu+15
Network
Published Oct 9, 2018
CVE-2017-7481
CRITICAL9.8

Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default, the jinja2 templating language is now marked as 'unsafe' and is not evaluated.

redhat / openshift_container_platform+14
Network
Published Jul 19, 2018
CVE-2018-11218
CRITICAL9.8

Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.

redislabs / redis+7
Network
Published Jun 17, 2018
CVE-2015-5741
CRITICAL9.8

The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP headers, which allows remote attackers to conduct HTTP request smuggling attacks via a request that contains Content-Length and Transfer-Encoding header fields.

golang / go+3
Network
Published Feb 8, 2020
CVE-2019-14859
CRITICAL9.1

A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions.

python-ecdsa_project / python-ecdsa+7
Network
Published Jan 2, 2020
CVE-2022-38065
HIGH8.8

A privilege escalation vulnerability exists in the oslo.privsep functionality of OpenStack git master 05194e7618 and prior. Overly permissive functionality within tools leveraging this library within a container can lead increased privileges.

redhat / openstack
Network
Published Dec 21, 2022
CVE-2021-3656
HIGH8.8

A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.

linux / linux_kernel+62
Local
Published Mar 4, 2022
CVE-2018-10898
HIGH8.8

A vulnerability was found in openstack-tripleo-heat-templates before version 8.0.2-40. When deployed using Director using default configuration, Opendaylight in RHOSP13 is configured with easily guessable default credentials.

redhat / openstack+1
Adjacent
Published Jul 30, 2018
CVE-2018-10915
HIGH8.5

A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.

redhat / openstack+16
Network
Published Aug 9, 2018
CVE-2019-10141
HIGH8.3

A vulnerability was found in openstack-ironic-inspector all versions excluding 5.0.2, 6.0.3, 7.2.4, 8.0.3 and 8.2.1. A SQL-injection vulnerability was found in openstack-ironic-inspector's node_cache.find_node(). This function makes a SQL query using unfiltered data from a server reporting inspection results (by a POST to the /v1/continue endpoint). Because the API is unauthenticated, the flaw could be exploited by an attacker with access to the network on which ironic-inspector is listening. Because of how ironic-inspector uses the query results, it is unlikely that data could be obtained. However, the attacker could pass malicious data and create a denial of service.

openstack / ironic-inspector+8
Network
Published Jul 30, 2019
CVE-2018-11806
HIGH8.2

m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.

qemu / qemu+25
Local
Published Jun 13, 2018
CVE-2017-2627
HIGH8.2

A flaw was found in openstack-tripleo-common as shipped with Red Hat Openstack Enterprise 10 and 11. The sudoers file as installed with OSP's openstack-tripleo-common package is much too permissive. It contains several lines for the mistral user that have wildcards that allow directory traversal with '..' and it grants full passwordless root access to the validations user.

redhat / openstack+2
Local
Published Aug 22, 2018
CVE-2018-10899
HIGH8.1

A flaw was found in Jolokia versions from 1.2 to before 1.6.1. Affected versions are vulnerable to a system-wide CSRF. This holds true for properly configured instances with strict checking for origin and referrer headers. This could result in a Remote Code Execution attack.

jolokia / jolokia+1
Network
Published Aug 1, 2019
CVE-2020-25717
HIGH8.1

A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.

samba / samba+43
Network
Published Feb 18, 2022
CVE-2016-9587
HIGH8.1

Ansible before versions 2.1.4, 2.2.1 is vulnerable to an improper input validation in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.

redhat / ansible+2
Network
Published Apr 24, 2018
CVE-2018-1000807
HIGH8.1

Python Cryptographic Authority pyopenssl version prior to version 17.5.0 contains a CWE-416: Use After Free vulnerability in X509 object handling that can result in Use after free can lead to possible denial of service or remote code execution.. This attack appear to be exploitable via Depends on the calling application and if it retains a reference to the memory.. This vulnerability appears to have been fixed in 17.5.0.

pyopenssl / pyopenssl+5
Network
Published Oct 8, 2018