📦 Openshift
by Redhat
🔍 What is Openshift?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
CVE-2013-4561 is a temporary file handling vulnerability in OpenShift's mcollective facts update cron job that allows local attackers to overwrite arbitrary files. This affects OpenShift Origin and En...
This vulnerability in rsync allows attackers to leak uninitialized stack memory one byte at a time by manipulating checksum length during file comparison. It affects systems using vulnerable rsync ver...
CVE-2023-44487 is an HTTP/2 protocol vulnerability that allows attackers to cause denial of service by rapidly resetting streams, consuming server resources. This affects any system using HTTP/2, incl...
CVE-2021-3697 is a heap buffer underflow vulnerability in GRUB2's JPEG parser that allows a crafted JPEG image to corrupt heap memory. Successful exploitation could lead to arbitrary code execution or...
This vulnerability allows attackers with access to a container mounting /etc/kubernetes or local node access to copy the kubeconfig file and potentially add unauthorized nodes to the OpenShift cluster...
This vulnerability allows an attacker with access to the operator-metering container in Red Hat OpenShift 4 to modify the /etc/passwd file, potentially enabling privilege escalation. It affects OpenSh...
This vulnerability in GLib's GIO component allows heap buffer overflow and denial-of-service via integer overflow when processing malicious file attributes. Systems using GLib for file operations or r...
This vulnerability in grub2 allows attackers to trigger an out-of-bounds write when processing language files, potentially overwriting sensitive heap data. This could lead to bypassing secure boot pro...