Redhat

Advanced Cluster Security

8 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Published 27.05.2025 20:51:34
  • Last modified 30.07.2025 20:15:38

A flaw was found in Stackrox, where it is vulnerable to Cross-site scripting (XSS) if the script code is included in a small subset of table cells. The only known potential exploit is if the script is included in the name of a Kubernetes “Role” objec...

  • EPSS 0.08%
  • Published 27.01.2025 14:15:27
  • Last modified 27.01.2025 14:15:27

A flaw was found in the Red Hat Advanced Cluster Security (RHACS) portal. When rendering a table view in the portal, for example, on any of the /main/configmanagement/* endpoints, the front-end generates a DOM table-element (id="pdf-table"). This inf...

  • EPSS 0.5%
  • Published 14.05.2024 15:42:07
  • Last modified 25.02.2025 08:15:29

A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.

  • EPSS 13.5%
  • Published 06.04.2024 17:15:07
  • Last modified 25.04.2025 15:02:44

A flaw was discovered in the mholt/archiver package. This flaw allows an attacker to create a specially crafted tar file, which, when unpacked, may allow access to restricted files or directories. This issue can allow the creation or overwriting of f...

Media report Exploit
  • EPSS 64.06%
  • Published 18.12.2023 16:15:10
  • Last modified 29.09.2025 21:56:10

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client a...

  • EPSS 0.03%
  • Published 12.12.2023 10:15:10
  • Last modified 21.11.2024 08:36:20

In Red Hat Advanced Cluster Security (RHACS), it was found that some security related HTTP headers were missing, allowing an attacker to exploit this with a clickjacking attack. An attacker could exploit this by convincing a valid RHACS user to visit...

Warning Media report Exploit
  • EPSS 94.44%
  • Published 10.10.2023 14:15:10
  • Last modified 11.06.2025 17:29:54

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

Exploit
  • EPSS 0.85%
  • Published 01.09.2022 21:15:09
  • Last modified 21.11.2024 06:41:43

A flaw was found in the Red Hat Advanced Cluster Security for Kubernetes. Notifier secrets were not properly sanitized in the GraphQL API. This flaw allows authenticated ACS users to retrieve Notifiers from the GraphQL API, revealing secrets that can...