Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat openshift service mesh 2.3.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2022-3962
A content spoofing vulnerability was found in Kiali. It exists that Kiali does not implement error handling when the page or endpoint being accessed cannot be found. This issue allows an malicious user to perform arbitrary text injection when an error response is retrieved from t...
Kiali Kiali -
Redhat Openshift Service Mesh 2.3.1
NA
CVE-2023-3089
A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.
Redhat Openshift Container Platform 4.10
Redhat Openshift Container Platform For Linuxone 4.10
Redhat Openshift Container Platform For Linuxone 4.11
Redhat Openshift Container Platform For Power 4.10
Redhat Openshift Container Platform For Power 4.11
Redhat Openshift Container Platform Ibm Z Systems 4.10
Redhat Openshift Container Platform Ibm Z Systems 4.11
Redhat Openshift Container Platform For Arm64 4.11
Redhat Openshift Container Platform For Arm64 4.10
Redhat Openshift Container Platform For Arm64 4.12
Redhat Openshift Container Platform For Linuxone 4.12
Redhat Openshift Container Platform For Power 4.12
Redhat Openshift Container Platform Ibm Z Systems 4.12
606
VMScore
CVE-2022-1304
An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.
E2fsprogs Project E2fsprogs 1.46.5
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 8.0
Fedoraproject Fedora 35
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started