Red Hat OpenShift Origin

CPE Details

Red Hat OpenShift Origin
-
2016-06-08
19h24 +00:00
2021-08-04
17h03 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:redhat:openshift_origin:-:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

openshift_origin

Version

-

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2014-0084 2019-11-21 13h04 +00:00 Ruby gem openshift-origin-node before 2014-02-14 does not contain a cronjob timeout which could result in a denial of service in cron.daily and cron.weekly.
5.5
Moyen
CVE-2014-3592 2019-11-13 14h33 +00:00 OpenShift Origin: Improperly validated team names could allow stored XSS attacks
6.1
Moyen
CVE-2016-2160 2016-06-08 15h00 +00:00 Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allow remote authenticated users to execute commands with root privileges by changing the root password in an sti builder image.
8.8
Haute
CVE-2016-3711 2016-06-08 15h00 +00:00 HAproxy in Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allows local users to obtain the internal IP address of a pod by reading the "OPENSHIFT_[namespace]_SERVERID" cookie.
3.3
Bas
CVE-2012-5646 2013-02-24 21h00 +00:00 node-util/www/html/restorer.php in the Red Hat OpenShift Origin before 1.0.5-3 allows remote attackers to execute arbitrary commands via a crafted uuid in the PATH_INFO.
7.5
CVE-2012-5647 2013-02-24 21h00 +00:00 Open redirect vulnerability in node-util/www/html/restorer.php in Red Hat OpenShift Origin before 1.0.5-3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the PATH_INFO.
5.8