Vulnerabilities
Vulnerable Software
Redhat:  >> Openshift  Security Vulnerabilities
A CSRF issue was found in OpenShift Enterprise 1.2. The web console is using 'Basic authentication' and the REST API has no CSRF attack protection mechanism. This can allow an attacker to obtain the credential and the Authorization: header when requesting the REST API via web browser.
CVSS Score
6.5
EPSS Score
0.001
Published
2019-12-30
swagger-ui has XSS in key names
CVSS Score
6.1
EPSS Score
0.049
Published
2019-12-20
mcollective has a default password set at install
CVSS Score
9.8
EPSS Score
0.006
Published
2019-12-13
Openshift has shell command injection flaws due to unsanitized data being passed into shell commands.
CVSS Score
8.8
EPSS Score
0.018
Published
2019-12-11
node-connect before 2.8.1 has XSS in the Sencha Labs Connect middleware
CVSS Score
6.1
EPSS Score
0.011
Published
2019-12-11
OpenShift haproxy cartridge: predictable /tmp in set-proxy connection hook which could facilitate DoS
CVSS Score
5.5
EPSS Score
0.001
Published
2019-12-05
OpenShift cartridge allows remote URL retrieval
CVSS Score
8.1
EPSS Score
0.003
Published
2019-12-03
RubyGems passenger 4.0.0 betas 1 and 2 allows remote attackers to delete arbitrary files during the startup process.
CVSS Score
7.5
EPSS Score
0.013
Published
2019-11-19
OpenShift: Install script has temporary file creation vulnerability which can result in arbitrary code execution
CVSS Score
7.8
EPSS Score
0.001
Published
2019-11-15
The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.
CVSS Score
5.9
EPSS Score
0.124
Published
2019-11-05


Contact Us

Shodan ® - All rights reserved