Show filters
30 Total Results
Displaying 11-20 of 30
Sort by:
Attacker Value
Unknown
CVE-2017-7481
Disclosure Date: July 19, 2018 (last updated November 27, 2024)
Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default, the jinja2 templating language is now marked as 'unsafe' and is not evaluated.
0
Attacker Value
Unknown
CVE-2018-1257
Disclosure Date: May 11, 2018 (last updated November 26, 2024)
Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack.
0
Attacker Value
Unknown
CVE-2018-1102
Disclosure Date: April 30, 2018 (last updated November 26, 2024)
A flaw was found in source-to-image function as shipped with Openshift Enterprise 3.x. An improper path validation of tar files in ExtractTarStreamFromTarReader in tar/tar.go leads to privilege escalation.
0
Attacker Value
Unknown
CVE-2016-9592
Disclosure Date: April 16, 2018 (last updated November 08, 2023)
openshift before versions 3.3.1.11, 3.2.1.23, 3.4 is vulnerable to a flaw when a volume fails to detach, which causes the delete operation to fail with 'VolumeInUse' error. Since the delete operation is retried every 30 seconds for each volume, this could lead to a denial of service attack as the number of API requests being sent to the cloud-provider exceeds the API's rate-limit.
0
Attacker Value
Unknown
CVE-2017-7534
Disclosure Date: April 11, 2018 (last updated November 26, 2024)
OpenShift Enterprise version 3.x is vulnerable to a stored XSS via the log viewer for pods. The flaw is due to lack of sanitation of user input, specifically terminal escape characters, and the creation of clickable links automatically when viewing the log files for a pod.
0
Attacker Value
Unknown
CVE-2016-5418
Disclosure Date: September 21, 2016 (last updated November 25, 2024)
The sandboxing code in libarchive 3.2.0 and earlier mishandles hardlink archive entries of non-zero data size, which might allow remote attackers to write to arbitrary files via a crafted archive file.
0
Attacker Value
Unknown
CVE-2016-5392
Disclosure Date: August 05, 2016 (last updated November 25, 2024)
The API server in Kubernetes, as used in Red Hat OpenShift Enterprise 3.2, in a multi tenant environment allows remote authenticated users with knowledge of other project names to obtain sensitive project and user information via vectors related to the watch-cache list.
0
Attacker Value
Unknown
CVE-2016-3711
Disclosure Date: June 08, 2016 (last updated November 25, 2024)
HAproxy in Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allows local users to obtain the internal IP address of a pod by reading the "OPENSHIFT_[namespace]_SERVERID" cookie.
0
Attacker Value
Unknown
CVE-2016-2160
Disclosure Date: June 08, 2016 (last updated November 25, 2024)
Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allow remote authenticated users to execute commands with root privileges by changing the root password in an sti builder image.
0
Attacker Value
Unknown
CVE-2016-2149
Disclosure Date: June 08, 2016 (last updated November 25, 2024)
Red Hat OpenShift Enterprise 3.2 allows remote authenticated users to read log files from another namespace by using the same name as a previously deleted namespace when creating a new namespace.
0