Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat openshift service mesh 2.3.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2022-3962
A content spoofing vulnerability was found in Kiali. It exists that Kiali does not implement error handling when the page or endpoint being accessed cannot be found. This issue allows an malicious user to perform arbitrary text injection when an error response is retrieved from t...
Kiali Kiali -
Redhat Openshift Service Mesh 2.3.1
NA
CVE-2023-3089
A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.
Redhat Openshift Container Platform 4.10
Redhat Openshift Container Platform For Linuxone 4.10
Redhat Openshift Container Platform For Linuxone 4.11
Redhat Openshift Container Platform For Power 4.10
Redhat Openshift Container Platform For Power 4.11
Redhat Openshift Container Platform Ibm Z Systems 4.10
Redhat Openshift Container Platform Ibm Z Systems 4.11
Redhat Openshift Container Platform For Arm64 4.11
Redhat Openshift Container Platform For Arm64 4.10
Redhat Openshift Container Platform For Arm64 4.12
Redhat Openshift Container Platform For Linuxone 4.12
Redhat Openshift Container Platform For Power 4.12
Redhat Openshift Container Platform Ibm Z Systems 4.12
6.8
CVSSv2
CVE-2022-1304
An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.
E2fsprogs Project E2fsprogs 1.46.5
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 8.0
Fedoraproject Fedora 35
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-3611
CVE-2024-4947
CVE-2024-32988
CVE-2020-35165
local file inclusion
CVE-2024-4980
bypass
malicious code
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started