Show filters
89 Total Results
Displaying 41-50 of 89
Sort by:
Attacker Value
Unknown

CVE-2021-4048

Disclosure Date: December 08, 2021 (last updated October 07, 2023)
An out-of-bounds read flaw was found in the CLARRV, DLARRV, SLARRV, and ZLARRV functions in lapack through version 3.10.0, as also used in OpenBLAS before version 0.3.18. Specially crafted inputs passed to these functions could cause an application using lapack to crash or possibly disclose portions of its memory.
Attacker Value
Unknown

CVE-2021-3529

Disclosure Date: June 02, 2021 (last updated February 22, 2025)
A flaw was found in noobaa-core in versions before 5.7.0. This flaw results in the name of an arbitrarily URL being copied into an HTML document as plain text between tags, including potentially a payload script. The input was echoed unmodified in the application response, resulting in arbitrary JavaScript being injected into an application's response. The highest threat to the system is for confidentiality, availability, and integrity.
Attacker Value
Unknown

CVE-2021-20297

Disclosure Date: May 26, 2021 (last updated February 22, 2025)
A flaw was found in NetworkManager in versions before 1.30.0. Setting match.path and activating a profile crashes NetworkManager. The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2021-20291

Disclosure Date: April 01, 2021 (last updated February 22, 2025)
A deadlock vulnerability was found in 'github.com/containers/storage' in versions before 1.28.1. When a container image is processed, each layer is unpacked using `tar`. If one of those layers is not a valid `tar` archive this causes an error leading to an unexpected situation where the code indefinitely waits for the tar unpacked stream, which never finishes. An attacker could use this vulnerability to craft a malicious image, which when downloaded and stored by an application using containers/storage, would then cause a deadlock leading to a Denial of Service (DoS).
Attacker Value
Unknown

CVE-2019-19353

Disclosure Date: March 24, 2021 (last updated February 22, 2025)
An insecure modification vulnerability in the /etc/passwd file was found in the operator-framework/hive as shipped in Red Hat Openshift 4. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges.
Attacker Value
Unknown

CVE-2019-19352

Disclosure Date: March 24, 2021 (last updated February 22, 2025)
An insecure modification vulnerability in the /etc/passwd file was found in the operator-framework/presto as shipped in Red Hat Openshift 4. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges.
Attacker Value
Unknown

CVE-2019-19349

Disclosure Date: March 24, 2021 (last updated February 22, 2025)
An insecure modification vulnerability in the /etc/passwd file was found in the container operator-framework/operator-metering as shipped in Red Hat Openshift 4. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges.
Attacker Value
Unknown

CVE-2019-19350

Disclosure Date: March 24, 2021 (last updated February 22, 2025)
An insecure modification vulnerability in the /etc/passwd file was found in the openshift/ansible-service-broker as shipped in Red Hat Openshift 4 and 3.11. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges.
Attacker Value
Unknown

CVE-2021-20270

Disclosure Date: March 23, 2021 (last updated February 22, 2025)
An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only contains the "exception" keyword.
Attacker Value
Unknown

CVE-2019-10225

Disclosure Date: March 19, 2021 (last updated February 22, 2025)
A flaw was found in atomic-openshift of openshift-4.2 where the basic-user RABC role in OpenShift Container Platform doesn't sufficiently protect the GlusterFS StorageClass against leaking of the restuserkey. An attacker with basic-user permissions is able to obtain the value of restuserkey, and use it to authenticate to the GlusterFS REST service, gaining access to read, and modify files.