Show filters
30 Total Results
Displaying 11-20 of 30
Sort by:
Attacker Value
Unknown

CVE-2017-7481

Disclosure Date: July 19, 2018 (last updated November 27, 2024)
Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default, the jinja2 templating language is now marked as 'unsafe' and is not evaluated.
Attacker Value
Unknown

CVE-2018-1257

Disclosure Date: May 11, 2018 (last updated November 26, 2024)
Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack.
Attacker Value
Unknown

CVE-2018-1102

Disclosure Date: April 30, 2018 (last updated November 26, 2024)
A flaw was found in source-to-image function as shipped with Openshift Enterprise 3.x. An improper path validation of tar files in ExtractTarStreamFromTarReader in tar/tar.go leads to privilege escalation.
0
Attacker Value
Unknown

CVE-2016-9592

Disclosure Date: April 16, 2018 (last updated November 08, 2023)
openshift before versions 3.3.1.11, 3.2.1.23, 3.4 is vulnerable to a flaw when a volume fails to detach, which causes the delete operation to fail with 'VolumeInUse' error. Since the delete operation is retried every 30 seconds for each volume, this could lead to a denial of service attack as the number of API requests being sent to the cloud-provider exceeds the API's rate-limit.
0
Attacker Value
Unknown

CVE-2017-7534

Disclosure Date: April 11, 2018 (last updated November 26, 2024)
OpenShift Enterprise version 3.x is vulnerable to a stored XSS via the log viewer for pods. The flaw is due to lack of sanitation of user input, specifically terminal escape characters, and the creation of clickable links automatically when viewing the log files for a pod.
0
Attacker Value
Unknown

CVE-2016-5418

Disclosure Date: September 21, 2016 (last updated November 25, 2024)
The sandboxing code in libarchive 3.2.0 and earlier mishandles hardlink archive entries of non-zero data size, which might allow remote attackers to write to arbitrary files via a crafted archive file.
0
Attacker Value
Unknown

CVE-2016-5392

Disclosure Date: August 05, 2016 (last updated November 25, 2024)
The API server in Kubernetes, as used in Red Hat OpenShift Enterprise 3.2, in a multi tenant environment allows remote authenticated users with knowledge of other project names to obtain sensitive project and user information via vectors related to the watch-cache list.
0
Attacker Value
Unknown

CVE-2016-3711

Disclosure Date: June 08, 2016 (last updated November 25, 2024)
HAproxy in Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allows local users to obtain the internal IP address of a pod by reading the "OPENSHIFT_[namespace]_SERVERID" cookie.
0
Attacker Value
Unknown

CVE-2016-2160

Disclosure Date: June 08, 2016 (last updated November 25, 2024)
Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allow remote authenticated users to execute commands with root privileges by changing the root password in an sti builder image.
0
Attacker Value
Unknown

CVE-2016-2149

Disclosure Date: June 08, 2016 (last updated November 25, 2024)
Red Hat OpenShift Enterprise 3.2 allows remote authenticated users to read log files from another namespace by using the same name as a previously deleted namespace when creating a new namespace.
0