cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-12084,https://securityvulnerability.io/vulnerability/CVE-2024-12084,Heap-based Buffer Overflow Vulnerability in Rsync Daemon by Red Hat,"A heap-based buffer overflow vulnerability has been identified in the rsync daemon, attributable to improper management of attacker-controlled checksum lengths (s2length). This weakness arises when the maximum digest length exceeds the designated fixed length of 16 bytes, allowing an attacker to exploit the flaw and write outside the allocated memory in the sum2 buffer. Such exploitation could potentially compromise system integrity and lead to unauthorized access or data manipulation.",Red Hat,"Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",9.8,CRITICAL,0.0006300000241026282,false,true,false,true,false,true,false,2025-01-15T14:16:35.363Z,6039 CVE-2024-12085,https://securityvulnerability.io/vulnerability/CVE-2024-12085,Rsync Daemon Memory Leak Vulnerability in Red Hat Products,"A vulnerability exists in the rsync daemon which can be exploited during the comparison of file checksums. An attacker can manipulate the checksum length, leading to potential leaks of one byte of uninitialized stack data at a time. This weakness could allow unauthorized access to sensitive information in memory, posing a security risk to affected systems.",Red Hat,"Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Openshift Container Platform 4",7.5,HIGH,0.00044999999227002263,false,false,false,false,false,false,false,2025-01-14T18:15:00.000Z,232 CVE-2024-12088,https://securityvulnerability.io/vulnerability/CVE-2024-12088,Path Traversal Vulnerability in Rsync Affects Multiple Platforms,"A vulnerability exists in Rsync when utilizing the `--safe-links` option. The software fails to properly validate symbolic link destinations, allowing the potential for a path traversal attack. This flaw may permit unauthorized file writes to locations outside the intended directory, posing a significant risk to systems using affected Rsync versions. It is crucial for users to evaluate their use of Rsync and apply any necessary patches to mitigate this risk.",Red Hat,"Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",6.5,MEDIUM,0.00044999999227002263,false,false,false,false,false,false,false,2025-01-14T18:15:00.000Z,0 CVE-2024-12087,https://securityvulnerability.io/vulnerability/CVE-2024-12087,Path Traversal Vulnerability in rsync Affects Red Hat,"A path traversal vulnerability in rsync allows a malicious server to exploit the `--inc-recursive` option, which is often enabled by default. This vulnerability arises from insufficient symlink verification and deduplication checks that occur on a per-file-list basis. An attacker could leverage this flaw to write files outside of the client's intended destination directory, potentially placing harmful files in arbitrary locations that mimic valid directories and paths on the client system.",Red Hat,"Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",6.5,MEDIUM,0.00044999999227002263,false,false,false,false,false,false,false,2025-01-14T18:15:00.000Z,0 CVE-2024-12086,https://securityvulnerability.io/vulnerability/CVE-2024-12086,File Enumeration Vulnerability in rsync by Red Hat,"A vulnerability in rsync has been identified that allows a server to expose the contents of files located on a client's machine. This issue arises during the process of file synchronization, where the rsync server transmits checksums of its local files to a client for comparison, determining which files need to be transferred. By exploiting this vulnerability, an attacker can craft specific checksum values to coax the rsync server into divulging sensitive information about arbitrary files. This enables a potential attacker to reconstruct the data from these files byte by byte, posing a significant risk to the integrity and confidentiality of sensitive information.",Red Hat,"Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",6.1,MEDIUM,0.00044999999227002263,false,false,false,false,false,false,false,2025-01-14T17:37:54.960Z,0 CVE-2024-45497,https://securityvulnerability.io/vulnerability/CVE-2024-45497,OpenShift Build Process Vulnerability Affecting Red Hat Products,"A significant vulnerability exists in the OpenShift build process, where the docker-build container is improperly configured with a hostPath volume mount that links the node's /var/lib/kubelet/config.json file to the build pod. This critical file contains sensitive credentials essential for accessing private repositories. The flawed configuration permits unprivileged write access, allowing attackers to overwrite this file. As a result, by modifying the config.json file, an attacker can cause a denial of service, disrupting the ability of the node to pull new container images. Additionally, this vulnerability poses significant risks by potentially allowing unauthorized access to sensitive credentials, which could lead to further compromises within the system.",Red Hat,"Red Hat Fuse 7,Red Hat Openshift Container Platform 4",7.6,HIGH,0.0004400000034365803,false,false,false,false,false,false,false,2024-12-31T02:19:22.553Z,0 CVE-2024-12698,https://securityvulnerability.io/vulnerability/CVE-2024-12698,Incomplete Protection in Rapid Reset for Red Hat's ose-olm-catalogd-container,"CVE-2024-12698 represents a security vulnerability concerning the ose-olm-catalogd-container, identified by Red Hat. This issue stems from an inadequate resolution of the Rapid Reset Vulnerability (CVE-2023-39325/CVE-2023-44487), where the focus was solely on unauthenticated streams, leaving authenticated streams vulnerable. As a result, the protocol does not fully secure all data streams, exposing systems to potential unauthorized access and manipulation by malicious actors. Users of affected versions are strongly encouraged to apply the latest security updates to mitigate risks associated with this threat.",Red Hat,Red Hat Openshift Container Platform 4,6.5,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2024-12-18T05:15:00.000Z,0 CVE-2024-12401,https://securityvulnerability.io/vulnerability/CVE-2024-12401,Cert-Manager Vulnerability Permits CPU-Based DoS Attack,"A flaw was found in the cert-manager package. This flaw allows an attacker who can modify PEM data that the cert-manager reads, for example, in a Secret resource, to use large amounts of CPU in the cert-manager controller pod to effectively create a denial-of-service (DoS) vector for the cert-manager in the cluster.",Red Hat,"Cert-manager Operator For Red Hat Openshift,Cryostat 3,Multicluster Engine For Kubernetes,Openshift Serverless,Red Hat Connectivity Link,Red Hat Openshift Container Platform 4,Red Hat Openshift Data Foundation 4,Red Hat Openshift Gitops",4.4,MEDIUM,0.0021299999207258224,false,false,false,false,,false,false,2024-12-12T09:06:03.612Z,0 CVE-2024-10963,https://securityvulnerability.io/vulnerability/CVE-2024-10963,Pam_Access Vulnerability: Bypassing Access Restrictions through Token Manipulation,"A vulnerability exists in PAM Access whereby certain entries in its configuration file can be incorrectly recognized as hostnames. This flaw enables attackers to masquerade as legitimate hostnames, potentially leading to unauthorized access to services and terminals. Systems leveraging PAM Access for managing user authentication could be compromised due to this misconfiguration issue, creating a significant risk for organizations relying on these security measures.",Red Hat,"Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",7.4,HIGH,0.000910000002477318,false,false,false,false,,false,false,2024-11-07T16:02:34.873Z,0 CVE-2024-50311,https://securityvulnerability.io/vulnerability/CVE-2024-50311,Graphql: denial of service (dos) vulnerability via graphql batching,"A denial of service (DoS) vulnerability was found in OpenShift. This flaw allows attackers to exploit the GraphQL batching functionality. The vulnerability arises when multiple queries can be sent within a single request, enabling an attacker to submit a request containing thousands of aliases in one query. This issue causes excessive resource consumption, leading to application unavailability for legitimate users.",Red Hat,Red Hat Openshift Container Platform 4,6.5,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-10-22T14:15:00.000Z,0 CVE-2024-50312,https://securityvulnerability.io/vulnerability/CVE-2024-50312,Graphql: information disclosure via graphql introspection in openshift,"A vulnerability was found in GraphQL due to improper access controls on the GraphQL introspection query. This flaw allows unauthorized users to retrieve a comprehensive list of available queries and mutations. Exposure to this flaw increases the attack surface, as it can facilitate the discovery of flaws or errors specific to the application's GraphQL implementation.",Red Hat,"Red Hat Openshift Container Platform 4.16,Red Hat Openshift Container Platform 4.17",5.3,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2024-10-22T14:15:00.000Z,0 CVE-2024-8418,https://securityvulnerability.io/vulnerability/CVE-2024-8418,Containers/aardvark-dns: tcp query handling flaw in aardvark-dns leading to denial of service,"Aardvark-dns has a vulnerability that allows attackers to conduct Denial of Service (DoS) attacks through improper handling of TCP DNS queries. The flaw arises from the serial processing of these queries, which permits an attacker to maintain a TCP connection indefinitely. This behavior can lead to the DNS server becoming unresponsive as legitimate queries time out, greatly affecting DNS service availability and disrupting normal operations for users.",Red Hat,"Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",7.5,HIGH,0.0005200000014156103,false,false,false,false,,false,false,2024-09-04T15:15:00.000Z,0 CVE-2024-43167,https://securityvulnerability.io/vulnerability/CVE-2024-43167,Segmentation Fault Vulnerability in Unbound's ub_ctx_set_fwd Function,"A NULL pointer dereference flaw was found in the ub_ctx_set_fwd function in Unbound. This issue could allow an attacker who can invoke specific sequences of API calls to cause a segmentation fault. When certain API functions such as ub_ctx_set_fwd and ub_ctx_resolvconf are called in a particular order, the program attempts to read from a NULL pointer, leading to a crash. This issue can result in a denial of service by causing the application to terminate unexpectedly.",Red Hat,"Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4,Red Hat Openstack Platform 16.2,Red Hat Openstack Platform 17.1,Red Hat Openstack Platform 18.0",2.8,LOW,0.00044999999227002263,false,false,false,false,,false,false,2024-08-12T13:38:00.000Z,0 CVE-2024-43168,https://securityvulnerability.io/vulnerability/CVE-2024-43168,Unbound: heap-buffer-overflow in unbound,"A heap-buffer-overflow flaw was found in the cfg_mark_ports function within Unbound's config_file.c, which can lead to memory corruption. This issue could allow an attacker with local access to provide specially crafted input, potentially causing the application to crash or allowing arbitrary code execution. This could result in a denial of service or unauthorized actions on the system.",Red Hat,"Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4,Red Hat Openstack Platform 16.2,Red Hat Openstack Platform 17.1,Red Hat Openstack Platform 18.0",4.8,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2024-08-12T13:38:00.000Z,0 CVE-2024-7409,https://securityvulnerability.io/vulnerability/CVE-2024-7409,QEMU NBD Server Vulnerability: DoS Attack via Socket Closure,A flaw was found in the QEMU NBD Server. This vulnerability allows a denial of service (DoS) attack via improper synchronization during socket closure when a client keeps a socket open as the server is taken offline.,Red Hat,"Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9.2 Extended Update Support,Red Hat Openshift Container Platform 4.13,Red Hat Openshift Container Platform 4.15,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8 Advanced Virtualization,Red Hat Enterprise Linux 9",,,0.0004600000102072954,false,false,false,false,,false,false,2024-08-05T13:19:27.498Z,0 CVE-2024-7128,https://securityvulnerability.io/vulnerability/CVE-2024-7128,Openshift Console Flaw Allows Data Exposure Without Proper Credential Verification,"A flaw was found in the OpenShift console. Several endpoints in the application use the authHandler() and authHandlerWithUser() middleware functions. When the default authentication provider (""openShiftAuth"") is set, these functions do not perform any authentication checks, relying instead on the targeted service to handle authentication and authorization. This issue leads to various degrees of data exposure due to a lack of proper credential verification.",Red Hat,"Red Hat Openshift Container Platform 3.11,Red Hat Openshift Container Platform 4",5.3,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-07-26T13:34:19.647Z,0 CVE-2024-7079,https://securityvulnerability.io/vulnerability/CVE-2024-7079,Unauthorized Access to /API/helm/verify Endpoint in Openshift,"A flaw was found in the Openshift console. The /API/helm/verify endpoint is tasked to fetch and verify the installation of a Helm chart from a URI that is remote HTTP/HTTPS or local. Access to this endpoint is gated by the authHandlerWithUser() middleware function. Contrary to its name, this middleware function does not verify the validity of the user's credentials. As a result, unauthenticated users can access this endpoint.",Red Hat,"Red Hat Openshift Container Platform 3.11,Red Hat Openshift Container Platform 4",6.5,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-07-24T15:51:36.331Z,0 CVE-2024-6501,https://securityvulnerability.io/vulnerability/CVE-2024-6501,Denial of Service Vulnerability in NetworkManager by Red Hat,"A vulnerability exists in NetworkManager that can be exploited when DEBUG logging is enabled and an interface configured with LLDP is active. A malicious user can send a crafted LLDP packet, causing NetworkManager to crash and resulting in denial of service. Keeping NetworkManager updated and logging configurations properly managed is crucial to mitigate this risk.",Red Hat,",Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Openshift Container Platform 4",3.1,LOW,0.00044999999227002263,false,false,false,false,,false,false,2024-07-09T20:15:00.000Z,0 CVE-2024-6387,https://securityvulnerability.io/vulnerability/CVE-2024-6387,Signal Handler Race Condition in OpenSSH's Server,"A regression vulnerability discovered in OpenSSH's server (sshd) involves a race condition affecting the handling of signals. This vulnerability allows an attacker to exploit the sshd service by failing to authenticate within a specified timeframe. If successfully triggered, this flaw could alter the normal operation of the sshd service. As a result, an unauthenticated remote attacker may gain the ability to execute arbitrary code, potentially compromising the affected system. This vulnerability underscores the importance of timely security updates and robust configurations to safeguard systems running OpenSSH.",Red Hat,"Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9.0 Update Services For SAP Solutions,Red Hat Enterprise Linux 9.2 Extended Update Support,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Openshift Container Platform 4",8.1,HIGH,0.0026100000832229853,false,true,false,true,true,true,true,2024-07-01T12:37:25.431Z,159237 CVE-2024-5154,https://securityvulnerability.io/vulnerability/CVE-2024-5154,Container Orchestration Flaw Allows Arbitrary File Access,"A directory traversal vulnerability exists in CRI-O that can be exploited by a malicious container. This vulnerability allows an attacker to create symbolic links to arbitrary files on the host system using path traversal techniques such as ""../"". As a result, sensitive files may be accessed or modified, potentially compromising the security of the host environment. This flaw highlights the importance of secure container management practices and timely updates to mitigate risks associated with such vulnerabilities.",Red Hat,"Red Hat Openshift Container Platform 4.12,Red Hat Openshift Container Platform 4.13,Red Hat Openshift Container Platform 4.14,Red Hat Openshift Container Platform 4.15,Red Hat Openshift Container Platform 3.11",8.1,HIGH,0.0004600000102072954,false,false,false,false,,false,false,2024-06-12T08:51:43.565Z,0 CVE-2024-4369,https://securityvulnerability.io/vulnerability/CVE-2024-4369,Information Disclosure Flaw in OpenShift Image Registry Operator Could Lead to Identity Theft,"An information disclosure flaw was found in OpenShift's internal image registry operator. The AZURE_CLIENT_SECRET can be exposed through an environment variable defined in the pod definition, but is limited to Azure environments. An attacker controlling an account that has high enough permissions to obtain pod information from the openshift-image-registry namespace could use this obtained client secret to perform actions as the registry operator's Azure service account.",Red Hat,"Red Hat Openshift Container Platform 4.14,Red Hat Openshift Container Platform 4.15",6.8,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2024-05-01T00:15:00.000Z,0 CVE-2024-3154,https://securityvulnerability.io/vulnerability/CVE-2024-3154,Arbitrary Systemd Property Injection Vulnerability in cri-o,"A vulnerability exists in the cri-o container runtime where attackers can inject arbitrary systemd properties through Pod annotations. This flaw allows any user with the capability to create a Pod to conduct unauthorized actions on the host system, posing significant security risks. Organizations utilizing affected versions of cri-o are advised to implement mitigations and updates to prevent potential exploitation.",Red Hat,"Red Hat Openshift Container Platform 4.12,Red Hat Openshift Container Platform 4.14,Red Hat Openshift Container Platform 4.15,Red Hat Openshift Container Platform 3.11",7.2,HIGH,0.0004400000034365803,false,false,false,true,true,false,false,2024-04-26T04:15:00.000Z,0 CVE-2024-1139,https://securityvulnerability.io/vulnerability/CVE-2024-1139,Remote Attacker May Discover Repository Pull Secret via Basic Login Credentials,"A credentials leak vulnerability has been identified in the cluster monitoring operator of OpenShift Container Platform (OCP). This issue potentially enables a remote attacker, armed with basic login credentials, to inspect the pod manifest. By doing so, the attacker may discover sensitive information, including repository pull secrets. Without proper remediation, this vulnerability could lead to unauthorized access to critical resources within the OCP environment.",Red Hat,"Red Hat Openshift Container Platform 4.12,Red Hat Openshift Container Platform 4.13,Red Hat Openshift Container Platform 4.14,Red Hat Openshift Container Platform 4.15,Red Hat Advanced Cluster Management For Kubernetes 2,Red Hat Openshift Container Platform 3.11",7.7,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2024-04-25T17:15:00.000Z,0 CVE-2023-6596,https://securityvulnerability.io/vulnerability/CVE-2023-6596,Openshift: incomplete fix for rapid reset (cve-2023-44487/cve-2023-39325),"An incomplete fix was implemented for the previously identified vulnerabilities related to Rapid Reset in OpenShift Containers. This ongoing problem stems from prior issues associated with CVE-2023-44487 and CVE-2023-39325, highlighting a critical need for users to be aware of the potential security risks. Administrators should closely monitor updates and advisories from Red Hat to mitigate any threats associated with this vulnerability. Please refer to the vendor’s official advisories for further details.",Red Hat,"Red Hat Openshift Container Platform 4.11,Red Hat Openshift Container Platform 4.12,Red Hat Openshift Container Platform 4",7.5,HIGH,0.00044999999227002263,false,false,false,false,,false,false,2024-04-25T16:15:00.000Z,0 CVE-2024-0406,https://securityvulnerability.io/vulnerability/CVE-2024-0406,Specially crafted tar file can grant access to restricted files or directories,"A flaw was discovered in the mholt/archiver package. This flaw allows an attacker to create a specially crafted tar file, which, when unpacked, may allow access to restricted files or directories. This issue can allow the creation or overwriting of files with the user's or application's privileges using the library.",Red Hat,"Mholt,Red Hat Advanced Cluster Security 3,Red Hat Advanced Cluster Security 4,Red Hat Openshift Container Platform 4",6.1,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2024-04-06T16:11:02.643Z,0