Redhat

Openshift Dev Spaces

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 26.01.2026 19:36:40
  • Zuletzt bearbeitet 27.01.2026 14:59:34

A flaw was found in Hibernate Reactive. When an HTTP endpoint is exposed to perform database operations, a remote client can prematurely close the HTTP connection. This action may lead to leaking connections from the database connection pool, potenti...

  • EPSS 0.28%
  • Veröffentlicht 13.01.2026 15:35:01
  • Zuletzt bearbeitet 14.01.2026 16:26:00

A flaw was found in Eclipse Che che-machine-exec. This vulnerability allows unauthenticated remote arbitrary command execution and secret exfiltration (SSH keys, tokens, etc.) from other users' Developer Workspace containers, via an unauthenticated J...

  • EPSS 0.01%
  • Veröffentlicht 02.12.2025 18:53:35
  • Zuletzt bearbeitet 04.12.2025 17:15:25

A container privilege escalation flaw was found in certain CodeReady Workspaces images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute com...

  • EPSS 0.15%
  • Veröffentlicht 05.09.2025 19:54:30
  • Zuletzt bearbeitet 13.11.2025 10:15:55

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful...

Medienbericht Exploit
  • EPSS 47.99%
  • Veröffentlicht 18.12.2023 16:15:10
  • Zuletzt bearbeitet 04.11.2025 22:15:55

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client a...

Warnung Medienbericht Exploit
  • EPSS 94.36%
  • Veröffentlicht 10.10.2023 14:15:10
  • Zuletzt bearbeitet 07.11.2025 19:00:41

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.