Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
red hat vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-3676
A security issue exists in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.
Kubernetes Kubernetes
NA
CVE-2023-3955
A security issue exists in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.
Kubernetes Kubernetes
NA
CVE-2023-5528
A security issue exists in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes.
Kubernetes Kubernetes
Fedoraproject Fedora 37
Fedoraproject Fedora 38
Fedoraproject Fedora 39
5
CVSSv2
CVE-2022-23635
Istio is an open platform to connect, manage, and secure microservices. In affected versions the Istio control plane, `istiod`, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted message which results in the control plane cra...
Istio Istio
4.3
CVSSv2
CVE-2022-21655
Envoy is an open source edge and service proxy, designed for cloud-native applications. The envoy common router will segfault if an internal redirect selects a route configured with direct response or redirect actions. This will result in a denial of service. As a workaround turn...
Envoyproxy Envoy
6.8
CVSSv2
CVE-2022-21654
Envoy is an open source edge and service proxy, designed for cloud-native applications. Envoy's tls allows re-use when some cert validation settings have changed from their default configuration. The only workaround for this issue is to ensure that default tls settings are u...
Envoyproxy Envoy
4.3
CVSSv2
CVE-2012-2683
Multiple cross-site scripting (XSS) vulnerabilities in Cumin prior to 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allow remote malicious users to inject arbitrary web script or HTML via unspecified vectors related to (1) "error message di...
Trevor Mckay Cumin 0.1.5192-1
Trevor Mckay Cumin 0.1.4916-1
Trevor Mckay Cumin 0.1.5137-1
Trevor Mckay Cumin 0.1.5054-1
Trevor Mckay Cumin 0.1.5137-3
Trevor Mckay Cumin 0.1.4410-2
Trevor Mckay Cumin 0.1.4794-1
Trevor Mckay Cumin 0.1.5098-2
Trevor Mckay Cumin 0.1.5033-1
Trevor Mckay Cumin 0.1.4369-1
Trevor Mckay Cumin 0.1.5037-1
Trevor Mckay Cumin 0.1.3160-1
Trevor Mckay Cumin 0.1.5137-4
Trevor Mckay Cumin 0.1.5092-1
Trevor Mckay Cumin 0.1.5137-5
Trevor Mckay Cumin 0.1.5068-1
Trevor Mckay Cumin 0.1.4494-1
Trevor Mckay Cumin
Trevor Mckay Cumin 0.1.5105-1
Trevor Mckay Cumin 0.1.5137-2
Redhat Enterprise Mrg 2.0
7.5
CVSSv2
CVE-2012-2684
Multiple SQL injection vulnerabilities in the get_sample_filters_by_signature function in Cumin prior to 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allow remote malicious users to execute arbitrary SQL commands via the (1) agent or (2) object...
Trevor Mckay Cumin 0.1.4794-1
Trevor Mckay Cumin 0.1.5098-2
Trevor Mckay Cumin 0.1.5192-1
Trevor Mckay Cumin 0.1.5105-1
Trevor Mckay Cumin 0.1.5092-1
Trevor Mckay Cumin 0.1.4916-1
Trevor Mckay Cumin 0.1.5137-2
Trevor Mckay Cumin 0.1.5137-1
Trevor Mckay Cumin
Trevor Mckay Cumin 0.1.3160-1
Redhat Enterprise Mrg 2.0
Trevor Mckay Cumin 0.1.5137-5
Trevor Mckay Cumin 0.1.5068-1
Trevor Mckay Cumin 0.1.5054-1
Trevor Mckay Cumin 0.1.4369-1
Trevor Mckay Cumin 0.1.4410-2
Trevor Mckay Cumin 0.1.4494-1
Trevor Mckay Cumin 0.1.5137-4
Trevor Mckay Cumin 0.1.5137-3
Trevor Mckay Cumin 0.1.5037-1
Trevor Mckay Cumin 0.1.5033-1
5
CVSSv2
CVE-2022-24726
Istio is an open platform to connect, manage, and secure microservices. In affected versions the Istio control plane, istiod, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted message which results in the control plane crash...
Istio Istio
4
CVSSv2
CVE-2019-19337
A flaw was found in Red Hat Ceph Storage version 3 in the way the Ceph RADOS Gateway daemon handles S3 requests. An authenticated attacker can abuse this flaw by causing a remote denial of service by sending a specially crafted HTTP Content-Length header to the Ceph RADOS Gateway...
Redhat Ceph Storage 3.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
7
8
9
10
NEXT »