Логотип exploitDog
bind:CVE-2016-3703
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-3703

Количество 3

Количество 3

redhat логотип

CVE-2016-3703

больше 9 лет назад

Red Hat OpenShift Enterprise 3.2 and 3.1 do not properly validate the origin of a request when anonymous access is granted to a service/proxy or pod/proxy API for a specific pod, which allows remote attackers to access API credentials in the web browser localStorage via an access_token in the query parameter.

CVSS2: 6
EPSS: Низкий
nvd логотип

CVE-2016-3703

больше 9 лет назад

Red Hat OpenShift Enterprise 3.2 and 3.1 do not properly validate the origin of a request when anonymous access is granted to a service/proxy or pod/proxy API for a specific pod, which allows remote attackers to access API credentials in the web browser localStorage via an access_token in the query parameter.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-xhrq-h87x-w62q

больше 3 лет назад

Red Hat OpenShift Enterprise 3.2 and 3.1 do not properly validate the origin of a request when anonymous access is granted to a service/proxy or pod/proxy API for a specific pod, which allows remote attackers to access API credentials in the web browser localStorage via an access_token in the query parameter.

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2016-3703

Red Hat OpenShift Enterprise 3.2 and 3.1 do not properly validate the origin of a request when anonymous access is granted to a service/proxy or pod/proxy API for a specific pod, which allows remote attackers to access API credentials in the web browser localStorage via an access_token in the query parameter.

CVSS2: 6
0%
Низкий
больше 9 лет назад
nvd логотип
CVE-2016-3703

Red Hat OpenShift Enterprise 3.2 and 3.1 do not properly validate the origin of a request when anonymous access is granted to a service/proxy or pod/proxy API for a specific pod, which allows remote attackers to access API credentials in the web browser localStorage via an access_token in the query parameter.

CVSS3: 5.3
0%
Низкий
больше 9 лет назад
github логотип
GHSA-xhrq-h87x-w62q

Red Hat OpenShift Enterprise 3.2 and 3.1 do not properly validate the origin of a request when anonymous access is granted to a service/proxy or pod/proxy API for a specific pod, which allows remote attackers to access API credentials in the web browser localStorage via an access_token in the query parameter.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу