Search for packages
| purl | pkg:rpm/redhat/openshift@3.0.2.0-0.git.45.423f434?arch=el7ose |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.5 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-fmcb-kpgu-5fcg
Aliases: CVE-2016-1906 GHSA-m3fm-h5jp-q79p |
Authorization bypass in Openshift Openshift allows remote attackers to gain privileges by updating a build configuration that was created with an allowed type to a type that is not allowed. | There are no reported fixed by versions. |
|
VCID-k31a-cbd1-wkh5
Aliases: CVE-2016-1905 GHSA-xx8c-m748-xr4j |
Access Restriction Bypass in kubernetes The API server in Kubernetes does not properly check admission control, which allows remote authenticated users to access additional resources via a crafted patched object. ### Specific Go Packages Affected github.com/kubernetes/kubernetes/pkg/apiserver | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T14:38:18.700426+00:00 | RedHat Importer | Affected by | VCID-fmcb-kpgu-5fcg | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1906.json | 38.0.0 |
| 2026-04-01T14:38:15.919031+00:00 | RedHat Importer | Affected by | VCID-k31a-cbd1-wkh5 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1905.json | 38.0.0 |