Show filters
531 Total Results
Displaying 101-110 of 531
Sort by:
Attacker Value
Unknown
CVE-2024-1725
Disclosure Date: March 07, 2024 (last updated May 08, 2024)
A flaw was found in the kubevirt-csi component of OpenShift Virtualization's Hosted Control Plane (HCP). This issue could allow an authenticated attacker to gain access to the root HCP worker node's volume by creating a custom Persistent Volume that matches the name of a worker node.
0
Attacker Value
Unknown
CVE-2023-3966
Disclosure Date: February 22, 2024 (last updated February 23, 2024)
A flaw was found in Open vSwitch where multiple versions are vulnerable to crafted Geneve packets, which may result in a denial of service and invalid memory accesses. Triggering this issue requires that hardware offloading via the netlink path is enabled.
0
Attacker Value
Unknown
CVE-2024-1635
Disclosure Date: February 19, 2024 (last updated October 22, 2024)
A vulnerability was found in Undertow. This vulnerability impacts a server that supports the wildfly-http-client protocol. Whenever a malicious user opens and closes a connection with the HTTP port of the server and then closes the connection immediately, the server will end with both memory and open file limits exhausted at some point, depending on the amount of memory available.
At HTTP upgrade to remoting, the WriteTimeoutStreamSinkConduit leaks connections if RemotingConnection is closed by Remoting ServerConnectionOpenListener. Because the remoting connection originates in Undertow as part of the HTTP upgrade, there is an external layer to the remoting connection. This connection is unaware of the outermost layer when closing the connection during the connection opening procedure. Hence, the Undertow WriteTimeoutStreamSinkConduit is not notified of the closed connection in this scenario. Because WriteTimeoutStreamSinkConduit creates a timeout task, the whole dependency tree l…
0
Attacker Value
Unknown
CVE-2024-1485
Disclosure Date: February 14, 2024 (last updated October 22, 2024)
A flaw was found in the decompression function of registry-support. This issue can be triggered if an unauthenticated remote attacker tricks a user into parsing a devfile which uses the `parent` or `plugin` keywords. This could download a malicious archive and cause the cleanup process to overwrite or delete files outside of the archive, which should not be allowed.
0
Attacker Value
Unknown
CVE-2023-6291
Disclosure Date: January 26, 2024 (last updated October 22, 2024)
A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate other users.
0
Attacker Value
Unknown
CVE-2023-6476
Disclosure Date: January 09, 2024 (last updated April 25, 2024)
A flaw was found in CRI-O that involves an experimental annotation leading to a container being unconfined. This may allow a pod to specify and get any amount of memory/cpu, circumventing the kubernetes scheduler and potentially resulting in a denial of service in the node.
0
Attacker Value
Unknown
CVE-2023-2585
Disclosure Date: December 21, 2023 (last updated May 03, 2024)
Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client.
0
Attacker Value
Unknown
CVE-2023-6134
Disclosure Date: December 14, 2023 (last updated June 12, 2024)
A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748.
0
Attacker Value
Unknown
CVE-2023-6563
Disclosure Date: December 14, 2023 (last updated April 25, 2024)
An unconstrained memory consumption vulnerability was discovered in Keycloak. It can be triggered in environments which have millions of offline tokens (> 500,000 users with each having at least 2 saved sessions). If an attacker creates two or more user sessions and then open the "consents" tab of the admin User Interface, the UI attempts to load a huge number of offline client sessions leading to excessive memory and CPU consumption which could potentially crash the entire system.
0
Attacker Value
Unknown
CVE-2023-5408
Disclosure Date: November 02, 2023 (last updated April 25, 2024)
A privilege escalation flaw was found in the node restriction admission plugin of the kubernetes api server of OpenShift. A remote attacker who modifies the node role label could steer workloads from the control plane and etcd nodes onto different worker nodes and gain broader access to the cluster.
0