Max CVSS 7.5 Min CVSS 2.1 Total Count2
IDCVSSSummaryLast (major) updatePublished
CVE-2014-3674 7.5
Red Hat OpenShift Enterprise before 2.2 does not properly restrict access to gears, which allows remote attackers to access the network resources of arbitrary gears via unspecified vectors.
13-02-2023 - 00:41 13-11-2014 - 21:32
CVE-2014-3602 2.1
Red Hat OpenShift Enterprise before 2.2 allows local users to obtain IP address and port number information for remote systems by reading /proc/net/tcp.
13-02-2023 - 00:40 13-11-2014 - 21:32
CVE-2014-0234 7.5
The default configuration of broker.conf in Red Hat OpenShift Enterprise 2.x before 2.1 has a password of "mooo" for a Mongo account, which allows remote attackers to hijack the broker by providing this password, related to the openshift.sh script in
13-02-2023 - 00:37 12-02-2020 - 01:15
CVE-2014-0175 7.5
mcollective has a default password set at install
13-02-2023 - 00:34 13-12-2019 - 13:15
CVE-2014-0084 2.1
Ruby gem openshift-origin-node before 2014-02-14 does not contain a cronjob timeout which could result in a denial of service in cron.daily and cron.weekly.
13-02-2023 - 00:31 21-11-2019 - 15:15
CVE-2012-3467 5.0
Apache QPID 0.14, 0.16, and earlier uses a NullAuthenticator mechanism to authenticate catch-up shadow connections to AMQP brokers, which allows remote attackers to bypass authentication.
29-08-2017 - 01:31 27-08-2012 - 23:55
CVE-2012-4458 5.0
The AMQP type decoder in Apache Qpid 0.20 and earlier allows remote attackers to cause a denial of service (memory consumption and server crash) via a large number of zero width elements in the client-properties map in a connection.start-ok message.
19-03-2013 - 16:49 14-03-2013 - 03:10
CVE-2012-4459 5.0
Integer overflow in the qpid::framing::Buffer::checkAvailable function in Apache Qpid 0.20 and earlier allows remote attackers to cause a denial of service (crash) via a crafted message, which triggers an out-of-bounds read.
19-03-2013 - 04:00 14-03-2013 - 03:10
CVE-2012-4446 6.8
The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified
19-03-2013 - 04:00 14-03-2013 - 03:10
Back to Top Mark selected
Back to Top