Red Hat Security Advisory 2021-1563-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.12.
048ce3b6806fc79000aaa21580a74b9477e681f7b9fc8aef3b3bb4d4efd0ef85
Red Hat Security Advisory 2021-1561-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include denial of service and integer overflow vulnerabilities.
e437a61a204e88b9037921ae3b96cf5eda566c7c4b860b2e62104b2092615796
Red Hat Security Advisory 2021-1562-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.12.
ae44f3f2b2120176e20ba773b4b56cf8274fd7796cd4f161c81afe8b54b4657b
Red Hat Security Advisory 2021-2095-01 - Red Hat OpenShift Serverless Client kn 1.14.1 provides a CLI to interact with Red Hat OpenShift Serverless 1.14.1. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. Issues addressed include a code execution vulnerability.
e308c1468aad01ec665814efee9eb07ce9f97ef894ba4eeba07b41306ffaef24
Red Hat Security Advisory 2021-2093-01 - Red Hat OpenShift Serverless 1.14.1 is a generally available release of the OpenShift Serverless Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6 and 4.7, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section. Issues addressed include a code execution vulnerability.
baec5d2ddc52c88b42fb7a620995eb4d6fae2594df45d63655a6961b41702aa1
Backdoor.Win32.Tonerok.d malware suffers from a code execution vulnerability.
d89a7505d629cc6fba1f798936b88077d553606a150394019d4bc812078ea3cf
Codiad version 2.8.4 suffers from a remote code execution vulnerability.
4b538410526a06035255e57015ef16fd091c575116f2fcf8b3b1dd8249289836
Backdoor.Win32.Spion4 malware suffers from insecure transit issues.
8bac0a76f0cd7170e9ce826732ba6b768690358bde5f535ef99c017f7b7f9dbd
Schlix CMS version 2.2.6-6 suffers from an arbitrary file upload and a directory traversal that together can lead to remote command execution.
fca5df7ad0d34a5f7b8addf705a53ad2dd0527cb631c1a47240bfd8afd22f8d1
PHP version 8.1.0-dev backdoor unauthenticated remote command injection exploit.
f51b0d373568167c85b67d4b60c1a737739975e2f231f5619d8e1b7a3a1058f6
Shopizer versions 2.16.0 and below suffer from multiple cross site scripting vulnerabilities.
f15a089b7dcf418d935f27932884b67add84f6119777557042986fb205a02eeb
iDailyDiary version 4.30 suffers from a denial of service vulnerability.
ab08487ed9c6cd04b478d62b9ad859640963033947395c4da0b42b090d3d908c
Backdoor.Win32.Upload.a malware suffers from a denial of service vulnerability.
4c6245a87e6421767c9377441a3310cc01489e66518b5d653698404989485d15
Backdoor.Win32.Spirit.12.b malware suffers from an insecure permissions vulnerability.
c81205395cc2ce19021a86b19634ef125263781a3cbcfb9b122be68801c44be8
WordPress ReDi Restaurant Reservation plugin version 21.0307 suffers from a persistent cross site scripting vulnerability.
8ad34d8c76465dc7b07f7fdbbaa7005db7b393559dc9279869c2d52fd7aff505
D-Link DWR-710 is missing server-side controls to ensure that null passwords are not set.
d4fb04ccc3705267fde078039060bb0697687df5c1b9cdeb6c7e9ff66be55e3f