Show filters
89 Total Results
Displaying 11-20 of 89
Sort by:
Attacker Value
Unknown

CVE-2024-7079

Disclosure Date: July 24, 2024 (last updated September 19, 2024)
A flaw was found in the Openshift console. The /API/helm/verify endpoint is tasked to fetch and verify the installation of a Helm chart from a URI that is remote HTTP/HTTPS or local. Access to this endpoint is gated by the authHandlerWithUser() middleware function. Contrary to its name, this middleware function does not verify the validity of the user's credentials. As a result, unauthenticated users can access this endpoint.
Attacker Value
Unknown

CVE-2024-5154

Disclosure Date: June 12, 2024 (last updated December 21, 2024)
A flaw was found in cri-o. A malicious container can create a symbolic link to arbitrary files on the host via directory traversal (“../“). This flaw allows the container to read and write to arbitrary files on the host system.
Attacker Value
Unknown

CVE-2024-5037

Disclosure Date: June 05, 2024 (last updated November 11, 2024)
A flaw was found in OpenShift's Telemeter. If certain conditions are in place, an attacker can use a forged token to bypass the issue ("iss") check during JSON web token (JWT) authentication.
Attacker Value
Unknown

CVE-2024-1485

Disclosure Date: February 14, 2024 (last updated October 22, 2024)
A flaw was found in the decompression function of registry-support. This issue can be triggered if an unauthenticated remote attacker tricks a user into parsing a devfile which uses the `parent` or `plugin` keywords. This could download a malicious archive and cause the cleanup process to overwrite or delete files outside of the archive, which should not be allowed.
Attacker Value
Unknown

CVE-2023-5366

Disclosure Date: October 06, 2023 (last updated October 13, 2023)
A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.
Attacker Value
Unknown

CVE-2022-3248

Disclosure Date: October 05, 2023 (last updated October 13, 2023)
A flaw was found in OpenShift API, as admission checks do not enforce "custom-host" permissions. This issue could allow an attacker to violate the boundaries, as permissions will not be applied.
Attacker Value
Unknown

CVE-2022-4145

Disclosure Date: October 05, 2023 (last updated October 13, 2023)
A content spoofing flaw was found in OpenShift's OAuth endpoint. This flaw allows a remote, unauthenticated attacker to inject text into a webpage, enabling the obfuscation of a phishing operation.
Attacker Value
Unknown

CVE-2023-3153

Disclosure Date: October 04, 2023 (last updated October 09, 2023)
A flaw was found in Open Virtual Network where the service monitor MAC does not properly rate limit. This issue could allow an attacker to cause a denial of service, including on deployments with CoPP enabled and properly configured.
Attacker Value
Unknown

CVE-2023-2253

Disclosure Date: June 06, 2023 (last updated October 08, 2023)
A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory.
Attacker Value
Unknown

CVE-2023-1668

Disclosure Date: April 10, 2023 (last updated October 08, 2023)
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.