Vulnerabilities > Redhat > Openshift > 3.1

DATE CVE VULNERABILITY TITLE RISK
2016-07-03 CVE-2016-2074 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
Buffer overflow in lib/flow.c in ovs-vswitchd in Open vSwitch 2.2.x and 2.3.x before 2.3.3 and 2.4.x before 2.4.1 allows remote attackers to execute arbitrary code via crafted MPLS packets, as demonstrated by a long string in an ovs-appctl command.
network
low complexity
openvswitch redhat CWE-119
7.5
2016-06-08 CVE-2016-3703 Improper Access Control vulnerability in Redhat Openshift 3.1/3.2
Red Hat OpenShift Enterprise 3.2 and 3.1 do not properly validate the origin of a request when anonymous access is granted to a service/proxy or pod/proxy API for a specific pod, which allows remote attackers to access API credentials in the web browser localStorage via an access_token in the query parameter.
network
high complexity
redhat CWE-284
5.3
2016-06-08 CVE-2016-2142 Information Exposure vulnerability in Redhat Openshift 3.1
Red Hat OpenShift Enterprise 3.1 uses world-readable permissions on the /etc/origin/master/master-config.yaml configuration file, which allows local users to obtain Active Directory credentials by reading the file.
local
low complexity
redhat CWE-200
5.5
2016-05-17 CVE-2016-3727 Information Exposure vulnerability in Jenkins
The API URL computer/(master)/api/xml in Jenkins before 2.3 and LTS before 1.651.2 allows remote authenticated users with extended read permission for the master node to obtain sensitive information about the global configuration via unspecified vectors.
network
low complexity
jenkins redhat CWE-200
4.0
2016-05-17 CVE-2016-3726 Open Redirection vulnerability in Jenkins
Multiple open redirect vulnerabilities in Jenkins before 2.3 and LTS before 1.651.2 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors related to "scheme-relative" URLs.
network
jenkins redhat
5.8
2016-05-17 CVE-2016-3725 Permissions, Privileges, and Access Controls vulnerability in Jenkins
Jenkins before 2.3 and LTS before 1.651.2 allows remote authenticated users to trigger updating of update site metadata by leveraging a missing permissions check.
network
low complexity
jenkins redhat CWE-264
5.0
2016-05-17 CVE-2016-3724 Information Exposure vulnerability in multiple products
Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with extended read access to obtain sensitive password information by reading a job configuration.
network
low complexity
redhat jenkins CWE-200
4.0
2016-05-17 CVE-2016-3723 Information Exposure vulnerability in Jenkins
Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with read access to obtain sensitive plugin installation information by leveraging missing permissions checks in unspecified XML/JSON API endpoints.
network
low complexity
jenkins redhat CWE-200
4.0
2016-05-17 CVE-2016-3722 Permissions, Privileges, and Access Controls vulnerability in multiple products
Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with multiple accounts to cause a denial of service (unable to login) by editing the "full name."
network
low complexity
jenkins redhat CWE-264
4.0
2016-05-17 CVE-2016-3721 Code vulnerability in multiple products
Jenkins before 2.3 and LTS before 1.651.2 might allow remote authenticated users to inject arbitrary build parameters into the build environment via environment variables.
network
low complexity
redhat jenkins CWE-17
6.5