Lucene search

K
RedhatOpenshift Container Platform3.9

10 matches found

CVE
CVE
added 2019/08/13 9:15 p.m.740 views

CVE-2019-9514

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STR...

7.8CVSS7.9AI score0.10058EPSS
CVE
CVE
added 2019/08/29 1:15 a.m.238 views

CVE-2019-11247

The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with acc...

8.1CVSS6.3AI score0.00447EPSS
CVE
CVE
added 2019/08/29 1:15 a.m.230 views

CVE-2019-11249

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is mali...

6.5CVSS6.3AI score0.0313EPSS
CVE
CVE
added 2019/10/17 4:15 p.m.210 views

CVE-2019-11253

Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming un...

7.5CVSS7.5AI score0.39799EPSS
CVE
CVE
added 2018/09/21 1:29 p.m.194 views

CVE-2018-14645

A flaw was discovered in the HPACK decoder of HAProxy, before 1.8.14, that is used for HTTP/2. An out-of-bounds read access in hpack_valid_idx() resulted in a remote crash and denial of service.

7.5CVSS7.1AI score0.00149EPSS
CVE
CVE
added 2019/04/01 2:29 p.m.165 views

CVE-2019-1002101

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run...

6.4CVSS5.9AI score0.49058EPSS
CVE
CVE
added 2018/09/06 2:29 p.m.91 views

CVE-2018-14632

An out of bound write can occur when patching an Openshift object using the 'oc patch' functionality in OpenShift Container Platform before 3.7. An attacker can use this flaw to cause a denial of service attack on the Openshift master api service which provides cluster management.

7.7CVSS7.1AI score0.0088EPSS
CVE
CVE
added 2018/08/13 5:29 p.m.66 views

CVE-2017-15138

The OpenShift Enterprise cluster-read can access webhook tokens which would allow an attacker with sufficient privileges to view confidential webhook tokens.

5CVSS5AI score0.00165EPSS
CVE
CVE
added 2018/07/16 8:29 p.m.65 views

CVE-2017-15137

The OpenShift image import whitelist failed to enforce restrictions correctly when running commands such as "oc tag", for example. This could allow a user with access to OpenShift to run images from registries that should not be allowed.

5.3CVSS5.3AI score0.00167EPSS
CVE
CVE
added 2018/07/02 5:29 p.m.50 views

CVE-2018-10843

source-to-image component of Openshift Container Platform before versions atomic-openshift 3.7.53, atomic-openshift 3.9.31 is vulnerable to a privilege escalation which allows the assemble script to run as the root user in a non-privileged container. An attacker can use this flaw to open network co...

9CVSS8.8AI score0.00281EPSS