cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2019-3884,https://securityvulnerability.io/vulnerability/CVE-2019-3884,,"A vulnerability exists in the garbage collection mechanism of atomic-openshift. An attacker able spoof the UUID of a valid object from another namespace is able to delete children of those objects. Versions 3.6, 3.7, 3.8, 3.9, 3.10, 3.11 and 4.1 are affected.",Red Hat,Atomic-openshift,3.6,LOW,0.0007200000109151006,false,false,false,false,,false,false,2019-08-01T13:20:50.000Z,0 CVE-2019-3889,https://securityvulnerability.io/vulnerability/CVE-2019-3889,,"A reflected XSS vulnerability exists in authorization flow of OpenShift Container Platform versions: openshift-online-3, openshift-enterprise-3.4 through 3.7 and openshift-enterprise-3.9 through 3.11. An attacker could use this flaw to steal authorization data by getting them to click on a malicious link.",Red Hat,Atomic-openshift,4.6,MEDIUM,0.0006500000017695129,false,false,false,false,,false,false,2019-07-11T18:27:40.000Z,0 CVE-2018-14632,https://securityvulnerability.io/vulnerability/CVE-2018-14632,,An out of bound write can occur when patching an Openshift object using the 'oc patch' functionality in OpenShift Container Platform before 3.7. An attacker can use this flaw to cause a denial of service attack on the Openshift master api service which provides cluster management.,Red Hat,Atomic-openshift,7.7,HIGH,0.002589999930933118,false,false,false,false,,false,false,2018-09-06T13:00:00.000Z,0 CVE-2018-1102,https://securityvulnerability.io/vulnerability/CVE-2018-1102,,A flaw was found in source-to-image function as shipped with Openshift Enterprise 3.x. An improper path validation of tar files in ExtractTarStreamFromTarReader in tar/tar.go leads to privilege escalation.,Red Hat,Atomic-openshift,8.8,HIGH,0.004389999900013208,false,false,false,false,,false,false,2018-04-30T19:00:00.000Z,0