Redhat

Openshift Dev Spaces

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 26.01.2026 19:36:40
  • Zuletzt bearbeitet 05.02.2026 15:16:06

A flaw was found in Hibernate Reactive. When an HTTP endpoint is exposed to perform database operations, a remote client can prematurely close the HTTP connection. This action may lead to leaking connections from the database connection pool, potenti...

  • EPSS 0.38%
  • Veröffentlicht 13.01.2026 15:35:01
  • Zuletzt bearbeitet 14.01.2026 16:26:00

A flaw was found in Eclipse Che che-machine-exec. This vulnerability allows unauthenticated remote arbitrary command execution and secret exfiltration (SSH keys, tokens, etc.) from other users' Developer Workspace containers, via an unauthenticated J...

  • EPSS 0%
  • Veröffentlicht 02.12.2025 18:53:35
  • Zuletzt bearbeitet 07.03.2026 00:16:10

A container privilege escalation flaw was found in certain CodeReady Workspaces images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute com...

  • EPSS 0.05%
  • Veröffentlicht 05.09.2025 19:54:30
  • Zuletzt bearbeitet 19.03.2026 18:16:16

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful...

Medienbericht Exploit
  • EPSS 62.63%
  • Veröffentlicht 18.12.2023 16:15:10
  • Zuletzt bearbeitet 04.11.2025 22:15:55

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client a...

Warnung Medienbericht Exploit
  • EPSS 94.39%
  • Veröffentlicht 10.10.2023 14:15:10
  • Zuletzt bearbeitet 07.11.2025 19:00:41

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.