Show filters
12 Total Results
Displaying 1-10 of 12
Sort by:
Attacker Value
Unknown
CVE-2014-0068
Disclosure Date: June 30, 2022 (last updated October 07, 2023)
It was reported that watchman in openshift node-utils creates /var/run/watchman.pid and /var/log/watchman.ouput with world writable permission.
0
Attacker Value
Unknown
CVE-2013-2095
Disclosure Date: December 10, 2019 (last updated November 27, 2024)
rubygem-openshift-origin-controller: API can be used to create applications via cartridge_cache.rb URI.prase() to perform command injection
0
Attacker Value
Unknown
CVE-2014-0084
Disclosure Date: November 21, 2019 (last updated November 27, 2024)
Ruby gem openshift-origin-node before 2014-02-14 does not contain a cronjob timeout which could result in a denial of service in cron.daily and cron.weekly.
0
Attacker Value
Unknown
CVE-2014-3592
Disclosure Date: November 13, 2019 (last updated November 27, 2024)
OpenShift Origin: Improperly validated team names could allow stored XSS attacks
0
Attacker Value
Unknown
CVE-2016-3711
Disclosure Date: June 08, 2016 (last updated November 25, 2024)
HAproxy in Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allows local users to obtain the internal IP address of a pod by reading the "OPENSHIFT_[namespace]_SERVERID" cookie.
0
Attacker Value
Unknown
CVE-2016-2160
Disclosure Date: June 08, 2016 (last updated November 25, 2024)
Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allow remote authenticated users to execute commands with root privileges by changing the root password in an sti builder image.
0
Attacker Value
Unknown
CVE-2015-5250
Disclosure Date: September 08, 2015 (last updated October 05, 2023)
The API server in OpenShift Origin 1.0.5 allows remote attackers to cause a denial of service (master process crash) via crafted JSON data.
0
Attacker Value
Unknown
CVE-2014-3496
Disclosure Date: June 20, 2014 (last updated October 05, 2023)
cartridge_repository.rb in OpenShift Origin and Enterprise 1.2.8 through 2.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a Source-Url ending with a (1) .tar.gz, (2) .zip, (3) .tgz, or (4) .tar file extension in a cartridge manifest file.
0
Attacker Value
Unknown
CVE-2012-5658
Disclosure Date: February 24, 2013 (last updated October 05, 2023)
rhc-chk.rb in Red Hat OpenShift Origin before 1.1, when -d (debug mode) is used, outputs the password and other sensitive information in cleartext, which allows context-dependent attackers to obtain sensitive information, as demonstrated by including log files or Bugzilla reports in support channels.
0
Attacker Value
Unknown
CVE-2013-0164
Disclosure Date: February 24, 2013 (last updated October 05, 2023)
The lockwrap function in port-proxy/bin/openshift-port-proxy-cfg in Red Hat OpenShift Origin before 1.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp.
0