Show filters
89 Total Results
Displaying 41-50 of 89
Sort by:
Attacker Value
Unknown
CVE-2021-4048
Disclosure Date: December 08, 2021 (last updated October 07, 2023)
An out-of-bounds read flaw was found in the CLARRV, DLARRV, SLARRV, and ZLARRV functions in lapack through version 3.10.0, as also used in OpenBLAS before version 0.3.18. Specially crafted inputs passed to these functions could cause an application using lapack to crash or possibly disclose portions of its memory.
0
Attacker Value
Unknown
CVE-2021-3529
Disclosure Date: June 02, 2021 (last updated February 22, 2025)
A flaw was found in noobaa-core in versions before 5.7.0. This flaw results in the name of an arbitrarily URL being copied into an HTML document as plain text between tags, including potentially a payload script. The input was echoed unmodified in the application response, resulting in arbitrary JavaScript being injected into an application's response. The highest threat to the system is for confidentiality, availability, and integrity.
0
Attacker Value
Unknown
CVE-2021-20297
Disclosure Date: May 26, 2021 (last updated February 22, 2025)
A flaw was found in NetworkManager in versions before 1.30.0. Setting match.path and activating a profile crashes NetworkManager. The highest threat from this vulnerability is to system availability.
0
Attacker Value
Unknown
CVE-2021-20291
Disclosure Date: April 01, 2021 (last updated February 22, 2025)
A deadlock vulnerability was found in 'github.com/containers/storage' in versions before 1.28.1. When a container image is processed, each layer is unpacked using `tar`. If one of those layers is not a valid `tar` archive this causes an error leading to an unexpected situation where the code indefinitely waits for the tar unpacked stream, which never finishes. An attacker could use this vulnerability to craft a malicious image, which when downloaded and stored by an application using containers/storage, would then cause a deadlock leading to a Denial of Service (DoS).
0
Attacker Value
Unknown
CVE-2019-19353
Disclosure Date: March 24, 2021 (last updated February 22, 2025)
An insecure modification vulnerability in the /etc/passwd file was found in the operator-framework/hive as shipped in Red Hat Openshift 4. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges.
0
Attacker Value
Unknown
CVE-2019-19352
Disclosure Date: March 24, 2021 (last updated February 22, 2025)
An insecure modification vulnerability in the /etc/passwd file was found in the operator-framework/presto as shipped in Red Hat Openshift 4. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges.
0
Attacker Value
Unknown
CVE-2019-19349
Disclosure Date: March 24, 2021 (last updated February 22, 2025)
An insecure modification vulnerability in the /etc/passwd file was found in the container operator-framework/operator-metering as shipped in Red Hat Openshift 4. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges.
0
Attacker Value
Unknown
CVE-2019-19350
Disclosure Date: March 24, 2021 (last updated February 22, 2025)
An insecure modification vulnerability in the /etc/passwd file was found in the openshift/ansible-service-broker as shipped in Red Hat Openshift 4 and 3.11. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges.
0
Attacker Value
Unknown
CVE-2021-20270
Disclosure Date: March 23, 2021 (last updated February 22, 2025)
An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only contains the "exception" keyword.
0
Attacker Value
Unknown
CVE-2019-10225
Disclosure Date: March 19, 2021 (last updated February 22, 2025)
A flaw was found in atomic-openshift of openshift-4.2 where the basic-user RABC role in OpenShift Container Platform doesn't sufficiently protect the GlusterFS StorageClass against leaking of the restuserkey. An attacker with basic-user permissions is able to obtain the value of restuserkey, and use it to authenticate to the GlusterFS REST service, gaining access to read, and modify files.
0