Total vulnerabilities in the database
A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged attacker to supply malicious YAML.
Software | From | Fixed in |
---|---|---|
redhat / fabric8-kubernetes | 5.1.0 | 5.1.2 |
redhat / fabric8-kubernetes | 5.2.0 | 5.3.2 |
redhat / fabric8-kubernetes | 5.8.0 | 5.8.0.x |
redhat / fabric8-kubernetes | 5.5.0 | 5.7.4 |
redhat / fabric8-kubernetes | 5.0.0-beta1 | 5.0.0-beta1.x |
redhat / fabric8-kubernetes | 5.0.1 | 5.0.3 |
redhat / fabric8-kubernetes | 5.11.0 | 5.11.2 |
redhat / fabric8-kubernetes | 5.9.0 | 5.10.2 |
redhat / process_automation | 7.0 | 7.0.x |
redhat / descision_manager | 7.0 | 7.0.x |
redhat / a-mq_streams | 2.0.1 | 2.0.1.x |
redhat / fuse | 7.11 | 7.11.x |
redhat / integration_camel_quarkus | 2.2.1 | 2.2.1.x |
redhat / build_of_quarkus | 2.2.5 | 2.2.5.x |
![]() |
5.0.0-beta-1 | 5.0.3 |
![]() |
5.1.0 | 5.1.2 |
![]() |
5.2.0 | 5.3.2 |
![]() |
5.5.0 | 5.7.4 |
![]() |
5.8.0 | 5.8.1 |
![]() |
5.9.0 | 5.10.2 |
![]() |
5.11.0 | 5.11.2 |