Redhat

Openshift Container Platform

272 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.33%
  • Veröffentlicht 11.09.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:20

A cross site scripting flaw exists in the tetonic-console component of Openshift Container Platform 3.11. An attacker with the ability to create pods can use this flaw to perform actions on the K8s API as the victim.

  • EPSS 0.85%
  • Veröffentlicht 06.09.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:28

An out of bound write can occur when patching an Openshift object using the 'oc patch' functionality in OpenShift Container Platform before 3.7. An attacker can use this flaw to cause a denial of service attack on the Openshift master api service whi...

  • EPSS 0.28%
  • Veröffentlicht 05.09.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:52:56

In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact.

  • EPSS 0.92%
  • Veröffentlicht 05.09.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 02:43:01

NodeJS Tough-Cookie version 2.2.2 contains a Regular Expression Parsing vulnerability in HTTP request Cookie Header parsing that can result in Denial of Service. This attack appear to be exploitable via Custom HTTP header passed by client. This vulne...

  • EPSS 1.45%
  • Veröffentlicht 21.08.2018 12:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:37

In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names `'ucs2'`, `'ucs-2'`, `'utf16le'` and `'utf-16le'`), `Buffer#write()` can be abused to write outside of the bounds of a ...

  • EPSS 0.17%
  • Veröffentlicht 13.08.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:14:08

The OpenShift Enterprise cluster-read can access webhook tokens which would allow an attacker with sufficient privileges to view confidential webhook tokens.

  • EPSS 0.24%
  • Veröffentlicht 01.08.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 02:59:46

An input validation flaw was found in the way OpenShift 3 handles requests for images. A user, with a copy of the manifest associated with an image, can pull an image even if they do not have access to the image normally, resulting in the disclosure ...

  • EPSS 0.2%
  • Veröffentlicht 27.07.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:09:01

A flaw was found in all Openshift Enterprise versions using the openshift elasticsearch plugin. An attacker with knowledge of the given name used to authenticate and access Elasticsearch can later access it without the token, bypassing authentication...

  • EPSS 0.84%
  • Veröffentlicht 25.07.2018 23:29:00
  • Zuletzt bearbeitet 21.11.2024 03:48:22

Poppler through 0.62 contains an out of bounds read vulnerability due to an incorrect memory access that is not mapped in its memory space, as demonstrated by pdfunite. This can result in memory corruption and denial of service. This may be exploitab...

  • EPSS 3.69%
  • Veröffentlicht 19.07.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:31:59

Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting ...