Search Results (Refine Search)
- CPE Product Version: cpe:/a:redhat:openshift:1.0:-:enterprise
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2014-0175 |
mcollective has a default password set at install Published: December 13, 2019; 8:15:10 AM -0500 |
V3.1: 9.8 CRITICAL V2.0: 7.5 HIGH |
CVE-2013-0164 |
The lockwrap function in port-proxy/bin/openshift-port-proxy-cfg in Red Hat OpenShift Origin before 1.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp. Published: February 24, 2013; 5:55:01 PM -0500 |
V3.x:(not available) V2.0: 3.6 LOW |
CVE-2012-5658 |
rhc-chk.rb in Red Hat OpenShift Origin before 1.1, when -d (debug mode) is used, outputs the password and other sensitive information in cleartext, which allows context-dependent attackers to obtain sensitive information, as demonstrated by including log files or Bugzilla reports in support channels. Published: February 24, 2013; 5:55:01 PM -0500 |
V3.x:(not available) V2.0: 2.1 LOW |
CVE-2012-5647 |
Open redirect vulnerability in node-util/www/html/restorer.php in Red Hat OpenShift Origin before 1.0.5-3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the PATH_INFO. Published: February 24, 2013; 4:55:01 PM -0500 |
V3.x:(not available) V2.0: 5.8 MEDIUM |
CVE-2012-5646 |
node-util/www/html/restorer.php in the Red Hat OpenShift Origin before 1.0.5-3 allows remote attackers to execute arbitrary commands via a crafted uuid in the PATH_INFO. Published: February 24, 2013; 4:55:00 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |