Redhat

Openshift

161 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 25.04.2024 16:15:10
  • Zuletzt bearbeitet 21.11.2024 08:44:10

An incomplete fix was shipped for the Rapid Reset (CVE-2023-44487/CVE-2023-39325) vulnerability for an OpenShift Containers.

  • EPSS 1.62%
  • Veröffentlicht 14.02.2024 00:15:46
  • Zuletzt bearbeitet 21.11.2024 08:50:41

A flaw was found in the decompression function of registry-support. This issue can be triggered if an unauthenticated remote attacker tricks a user into parsing a devfile which uses the `parent` or `plugin` keywords. This could download a malicious a...

Warnung Medienbericht Exploit
  • EPSS 94.42%
  • Veröffentlicht 10.10.2023 14:15:10
  • Zuletzt bearbeitet 07.11.2025 19:00:41

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

  • EPSS 0.09%
  • Veröffentlicht 26.01.2023 21:18:06
  • Zuletzt bearbeitet 01.04.2025 15:15:57

A flaw was found in github.com/openshift/apiserver-library-go, used in OpenShift 4.12 and 4.11, that contains an issue that can allow low-privileged users to set the seccomp profile for pods they control to "unconfined." By default, the seccomp profi...

  • EPSS 0.05%
  • Veröffentlicht 17.01.2023 21:15:15
  • Zuletzt bearbeitet 21.11.2024 07:36:55

The Birthday attack against 64-bit block ciphers flaw (CVE-2016-2183) was reported for the health checks port (9979) on etcd grpc-proxy component. Even though the CVE-2016-2183 has been fixed in the etcd components, to enable periodic health checks f...

  • EPSS 0.08%
  • Veröffentlicht 09.12.2022 18:15:19
  • Zuletzt bearbeitet 22.04.2025 21:15:43

Openshift 4.9 does not use HTTP Strict Transport Security (HSTS) which may allow man-in-the-middle (MITM) attacks.

Exploit
  • EPSS 0.28%
  • Veröffentlicht 08.12.2022 16:15:13
  • Zuletzt bearbeitet 23.04.2025 16:15:24

The response header has not enabled X-FRAME-OPTIONS, Which helps prevents against Clickjacking attack.. Some browsers would interpret these results incorrectly, allowing clickjacking attacks.

  • EPSS 0.53%
  • Veröffentlicht 08.12.2022 16:15:13
  • Zuletzt bearbeitet 23.04.2025 16:15:24

A flaw was found in Openshift. A pod with a DNSPolicy of "ClusterFirst" may incorrectly resolve the hostname based on a service provided. This flaw allows an attacker to supply an incorrect name with the DNS search policy, affecting confidentiality a...

  • EPSS 0.23%
  • Veröffentlicht 19.10.2022 18:15:11
  • Zuletzt bearbeitet 09.05.2025 16:15:20

The deployment script in the unsupported "OpenShift Extras" set of add-on scripts, in Red Hat Openshift 1, installs a default public key in the root user's authorized_keys file.

  • EPSS 0.03%
  • Veröffentlicht 19.10.2022 18:15:11
  • Zuletzt bearbeitet 09.05.2025 15:15:48

In Red Hat Openshift 1, weak default permissions are applied to the /etc/openshift/server_priv.pem file on the broker server, which could allow users with local access to the broker to read this file.