Show filters
12 Total Results
Displaying 1-10 of 12
Sort by:
Attacker Value
Unknown

CVE-2014-0068

Disclosure Date: June 30, 2022 (last updated October 07, 2023)
It was reported that watchman in openshift node-utils creates /var/run/watchman.pid and /var/log/watchman.ouput with world writable permission.
Attacker Value
Unknown

CVE-2013-2095

Disclosure Date: December 10, 2019 (last updated November 27, 2024)
rubygem-openshift-origin-controller: API can be used to create applications via cartridge_cache.rb URI.prase() to perform command injection
Attacker Value
Unknown

CVE-2014-0084

Disclosure Date: November 21, 2019 (last updated November 27, 2024)
Ruby gem openshift-origin-node before 2014-02-14 does not contain a cronjob timeout which could result in a denial of service in cron.daily and cron.weekly.
Attacker Value
Unknown

CVE-2014-3592

Disclosure Date: November 13, 2019 (last updated November 27, 2024)
OpenShift Origin: Improperly validated team names could allow stored XSS attacks
Attacker Value
Unknown

CVE-2016-3711

Disclosure Date: June 08, 2016 (last updated November 25, 2024)
HAproxy in Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allows local users to obtain the internal IP address of a pod by reading the "OPENSHIFT_[namespace]_SERVERID" cookie.
0
Attacker Value
Unknown

CVE-2016-2160

Disclosure Date: June 08, 2016 (last updated November 25, 2024)
Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allow remote authenticated users to execute commands with root privileges by changing the root password in an sti builder image.
0
Attacker Value
Unknown

CVE-2015-5250

Disclosure Date: September 08, 2015 (last updated October 05, 2023)
The API server in OpenShift Origin 1.0.5 allows remote attackers to cause a denial of service (master process crash) via crafted JSON data.
0
Attacker Value
Unknown

CVE-2014-3496

Disclosure Date: June 20, 2014 (last updated October 05, 2023)
cartridge_repository.rb in OpenShift Origin and Enterprise 1.2.8 through 2.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a Source-Url ending with a (1) .tar.gz, (2) .zip, (3) .tgz, or (4) .tar file extension in a cartridge manifest file.
0
Attacker Value
Unknown

CVE-2012-5658

Disclosure Date: February 24, 2013 (last updated October 05, 2023)
rhc-chk.rb in Red Hat OpenShift Origin before 1.1, when -d (debug mode) is used, outputs the password and other sensitive information in cleartext, which allows context-dependent attackers to obtain sensitive information, as demonstrated by including log files or Bugzilla reports in support channels.
0
Attacker Value
Unknown

CVE-2013-0164

Disclosure Date: February 24, 2013 (last updated October 05, 2023)
The lockwrap function in port-proxy/bin/openshift-port-proxy-cfg in Red Hat OpenShift Origin before 1.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp.
0