Red Hat OpenShift Origin

CPE Details

Red Hat OpenShift Origin
-
2016-06-08
19h24 +00:00
2021-08-04
17h03 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:redhat:openshift_origin:-:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

openshift_origin

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2014-0084 2019-11-21 13h04 +00:00 Ruby gem openshift-origin-node before 2014-02-14 does not contain a cronjob timeout which could result in a denial of service in cron.daily and cron.weekly.
5.5
Medium
CVE-2014-3592 2019-11-13 14h33 +00:00 OpenShift Origin: Improperly validated team names could allow stored XSS attacks
6.1
Medium
CVE-2016-2160 2016-06-08 15h00 +00:00 Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allow remote authenticated users to execute commands with root privileges by changing the root password in an sti builder image.
8.8
High
CVE-2016-3711 2016-06-08 15h00 +00:00 HAproxy in Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allows local users to obtain the internal IP address of a pod by reading the "OPENSHIFT_[namespace]_SERVERID" cookie.
3.3
Low
CVE-2012-5646 2013-02-24 21h00 +00:00 node-util/www/html/restorer.php in the Red Hat OpenShift Origin before 1.0.5-3 allows remote attackers to execute arbitrary commands via a crafted uuid in the PATH_INFO.
7.5
CVE-2012-5647 2013-02-24 21h00 +00:00 Open redirect vulnerability in node-util/www/html/restorer.php in Red Hat OpenShift Origin before 1.0.5-3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the PATH_INFO.
5.8