Necessarily indicate when this vulnerability wasĭiscovered, shared with the affected vendor, publicly
Trove free codes 2015 code#
Additionally players can get a Sageosaurus code by creating an account at Trovesaurus and redeeming the code here. 7XRG-FPHE-Y7XZ-NL7E-NYN9: Sanctuary Shuttle. The CVE ID was allocated or reserved, and does not MPJ7-LFWP-P7FF-Y9QW-GF6Q: Hexflame Harrier.
The list is not intended to be complete.ĭisclaimer: The record creation date may reflect when Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The _write_config function in trove/guestagent/datastore/experimental/mongodb/service.py, reset_configuration function in trove/guestagent/datastore/experimental/postgresql/service/config.py, write_config function in trove/guestagent/datastore/experimental/redis/service.py, _write_mycnf function in trove/guestagent/datastore/mysql/service.py, InnoBackupEx::_run_prepare function in trove/guestagent/strategies/restore/mysql_impl.py, InnoBackupEx::cmd function in trove/guestagent/strategies/backup/mysql_impl.py, MySQLDump::cmd in trove/guestagent/strategies/backup/mysql_impl.py, InnoBackupExIncremental::cmd function in trove/guestagent/strategies/backup/mysql_impl.py, _get_actual_db_status function in trove/guestagent/datastore/experimental/cassandra/system.py and trove/guestagent/datastore/experimental/cassandra/service.py, and multiple class CbBackup methods in trove/guestagent/strategies/backup/experimental/couchbase_impl.py in Openstack DBaaS (aka Trove) as packaged in Openstack before 2015.1.0 (aka Kilo) allows local users to write to configuration files via a symlink attack on a temporary file.