Show filters
532 Total Results
Displaying 131-140 of 532
Sort by:
Attacker Value
Unknown
CVE-2023-4456
Disclosure Date: August 21, 2023 (last updated April 25, 2024)
A flaw was found in openshift-logging LokiStack. The key used for caching is just the token, which is too broad. This issue allows a user with a token valid for one action to execute other actions as long as the authorization allowing the original action is still cached.
0
Attacker Value
Unknown
CVE-2023-0264
Disclosure Date: August 04, 2023 (last updated October 08, 2023)
A flaw was found in Keycloaks OpenID Connect user authentication, which may incorrectly authenticate requests. An authenticated attacker who could obtain information from a user request within the same realm could use that data to impersonate the victim and generate new session tokens. This issue could impact confidentiality, integrity, and availability.
0
Attacker Value
Unknown
CVE-2023-37947
Disclosure Date: July 12, 2023 (last updated October 08, 2023)
Jenkins OpenShift Login Plugin 1.1.0.227.v27e08dfb_1a_20 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins, allowing attackers to perform phishing attacks.
0
Attacker Value
Unknown
CVE-2023-37946
Disclosure Date: July 12, 2023 (last updated October 08, 2023)
Jenkins OpenShift Login Plugin 1.1.0.227.v27e08dfb_1a_20 and earlier does not invalidate the previous session on login.
0
Attacker Value
Unknown
CVE-2022-4361
Disclosure Date: July 07, 2023 (last updated October 08, 2023)
Keycloak, an open-source identity and access management solution, has a cross-site scripting (XSS) vulnerability in the SAML or OIDC providers. The vulnerability can allow an attacker to execute malicious scripts by setting the AssertionConsumerServiceURL value or the redirect_uri.
0
Attacker Value
Unknown
CVE-2023-3089
Disclosure Date: July 05, 2023 (last updated October 08, 2023)
A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.
0
Attacker Value
Unknown
CVE-2023-2253
Disclosure Date: June 06, 2023 (last updated October 08, 2023)
A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory.
0
Attacker Value
Unknown
CVE-2023-1668
Disclosure Date: April 10, 2023 (last updated October 08, 2023)
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
0
Attacker Value
Unknown
CVE-2022-1274
Disclosure Date: March 29, 2023 (last updated October 08, 2023)
A flaw was found in Keycloak in the execute-actions-email endpoint. This issue allows arbitrary HTML to be injected into emails sent to Keycloak users and can be misused to perform phishing or other attacks against users.
0
Attacker Value
Unknown
CVE-2021-3684
Disclosure Date: March 24, 2023 (last updated October 08, 2023)
A vulnerability was found in OpenShift Assisted Installer. During generation of the Discovery ISO, image pull secrets were leaked as plaintext in the installation logs. An authenticated user could exploit this by re-using the image pull secret to pull container images from the registry as the associated user.
0