Search for packages
| purl | pkg:rpm/redhat/ruby193-rubygem-compass@0.12.2-4?arch=el6op |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-1r79-ts6t-hufh
Aliases: CVE-2014-3674 |
Enterprise: gears fail to properly isolate network traffic | There are no reported fixed by versions. |
|
VCID-455w-hqsj-jkh1
Aliases: CVE-2013-0196 |
OpenShift Enterprise and Online vulnerable to CSRF attack with REST API | There are no reported fixed by versions. |
|
VCID-5ey2-dm5w-y7a6
Aliases: CVE-2014-3602 |
OpenShift: /proc/net/tcp information disclosure | There are no reported fixed by versions. |
|
VCID-c883-yge1-yygb
Aliases: CVE-2014-0084 GHSA-756m-3qf2-hp58 |
openshift-origin-node Improper Input Validation vulnerability Ruby gem openshift-origin-node before 2014-02-14 does not contain a cronjob timeout which could result in a denial of service in cron.daily and cron.weekly. | There are no reported fixed by versions. |
|
VCID-pb4n-q6u8-syds
Aliases: CVE-2013-0256 GHSA-v2r9-c84j-v7xm OSV-90004 |
XSS exploit of RDoc documentation generated by rdoc This exploit may lead to cookie disclosure to third parties. The exploit exists in darkfish.js which is copied from the RDoc install location to the generated documentation. RDoc is a static documentation generation tool. Patching the library itself is insufficient to correct this exploit. | There are no reported fixed by versions. |
|
VCID-s2ka-cp49-q3hz
Aliases: CVE-2014-0175 |
mcollective: default password set at install | There are no reported fixed by versions. |
|
VCID-vnm4-gfjh-8qa7
Aliases: CVE-2014-0234 |
openshift-origin-broker: default password creation | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||