Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat openshift vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2015-7538
Jenkins prior to 1.640 and LTS prior to 1.625.2 allow remote malicious users to bypass the CSRF protection mechanism via unspecified vectors.
Jenkins Jenkins
Redhat Openshift
Redhat Openshift 2.0
6.5
CVSSv3
CVE-2019-11249
The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary...
Kubernetes Kubernetes 1.12.11
Kubernetes Kubernetes
Redhat Openshift Container Platform 3.9
Redhat Openshift Container Platform 3.10
Redhat Openshift Container Platform 3.11
Redhat Openshift Container Platform 4.1
1 Article
6.5
CVSSv3
CVE-2023-2253
A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the all...
Redhat Openshift Container Platform 4.0
Redhat Openshift Developer Tools And Services -
Redhat Openshift Api For Data Protection -
7.5
CVSSv3
CVE-2019-11253
Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crash...
Kubernetes Kubernetes
Redhat Openshift Container Platform 3.9
Redhat Openshift Container Platform 3.11
Redhat Openshift Container Platform 3.10
1 Article
4.3
CVSSv3
CVE-2016-3723
Jenkins prior to 2.3 and LTS prior to 1.651.2 allow remote authenticated users with read access to obtain sensitive plugin installation information by leveraging missing permissions checks in unspecified XML/JSON API endpoints.
Jenkins Jenkins
Redhat Openshift 3.1
Redhat Openshift 3.2
4.3
CVSSv3
CVE-2016-3725
Jenkins prior to 2.3 and LTS prior to 1.651.2 allows remote authenticated users to trigger updating of update site metadata by leveraging a missing permissions check. NOTE: this issue can be combined with DNS cache poisoning to cause a denial of service (service disruption).
Jenkins Jenkins
Redhat Openshift 3.1
Redhat Openshift 3.2
7.4
CVSSv3
CVE-2016-3726
Multiple open redirect vulnerabilities in Jenkins prior to 2.3 and LTS prior to 1.651.2 allow remote malicious users to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors related to "scheme-relative" URLs.
Jenkins Jenkins
Redhat Openshift 3.1
Redhat Openshift 3.2
7.5
CVSSv3
CVE-2015-7539
The Plugins Manager in Jenkins prior to 1.640 and LTS prior to 1.625.2 does not verify checksums for plugin files referenced in update site data, which makes it easier for man-in-the-middle malicious users to execute arbitrary code via a crafted plugin.
Jenkins Jenkins
Redhat Openshift 2.0
Redhat Openshift 3.1
4.3
CVSSv3
CVE-2016-3722
Jenkins prior to 2.3 and LTS prior to 1.651.2 allow remote authenticated users with multiple accounts to cause a denial of service (unable to login) by editing the "full name."
Jenkins Jenkins
Redhat Openshift 3.1
Redhat Openshift 3.2
6.5
CVSSv3
CVE-2016-3724
Jenkins prior to 2.3 and LTS prior to 1.651.2 allow remote authenticated users with extended read access to obtain sensitive password information by reading a job configuration.
Redhat Openshift 3.1
Redhat Openshift 3.2
Jenkins Jenkins
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »