Show filters
532 Total Results
Displaying 141-150 of 532
Sort by:
Attacker Value
Unknown

CVE-2023-0056

Disclosure Date: March 23, 2023 (last updated October 08, 2023)
An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.
Attacker Value
Unknown

CVE-2023-27561

Disclosure Date: March 03, 2023 (last updated October 08, 2023)
runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.
Attacker Value
Unknown

CVE-2023-0229

Disclosure Date: January 26, 2023 (last updated October 08, 2023)
A flaw was found in github.com/openshift/apiserver-library-go, used in OpenShift 4.12 and 4.11, that contains an issue that can allow low-privileged users to set the seccomp profile for pods they control to "unconfined." By default, the seccomp profile used in the restricted-v2 Security Context Constraint (SCC) is "runtime/default," allowing users to disable seccomp for pods they can create and modify.
Attacker Value
Unknown

CVE-2023-0296

Disclosure Date: January 17, 2023 (last updated October 08, 2023)
The Birthday attack against 64-bit block ciphers flaw (CVE-2016-2183) was reported for the health checks port (9979) on etcd grpc-proxy component. Even though the CVE-2016-2183 has been fixed in the etcd components, to enable periodic health checks from kubelet, it was necessary to open up a new port (9979) on etcd grpc-proxy, hence this port might be considered as still vulnerable to the same type of vulnerability. The health checks on etcd grpc-proxy do not contain sensitive data (only metrics data), therefore the potential impact related to this vulnerability is minimal. The CVE-2023-0296 has been assigned to this issue to track the permanent fix in the etcd component.
Attacker Value
Unknown

CVE-2021-4294

Disclosure Date: December 28, 2022 (last updated February 24, 2025)
A vulnerability was found in OpenShift OSIN. It has been classified as problematic. This affects the function ClientSecretMatches/CheckClientSecret. The manipulation of the argument secret leads to observable timing discrepancy. The name of the patch is 8612686d6dda34ae9ef6b5a974e4b7accb4fea29. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216987.
Attacker Value
Unknown

CVE-2022-3259

Disclosure Date: December 09, 2022 (last updated February 24, 2025)
Openshift 4.9 does not use HTTP Strict Transport Security (HSTS) which may allow man-in-the-middle (MITM) attacks.
Attacker Value
Unknown

CVE-2022-3262

Disclosure Date: December 08, 2022 (last updated February 24, 2025)
A flaw was found in Openshift. A pod with a DNSPolicy of "ClusterFirst" may incorrectly resolve the hostname based on a service provided. This flaw allows an attacker to supply an incorrect name with the DNS search policy, affecting confidentiality and availability.
Attacker Value
Unknown

CVE-2022-3260

Disclosure Date: December 08, 2022 (last updated February 24, 2025)
The response header has not enabled X-FRAME-OPTIONS, Which helps prevents against Clickjacking attack.. Some browsers would interpret these results incorrectly, allowing clickjacking attacks.
Attacker Value
Unknown

CVE-2013-4281

Disclosure Date: October 19, 2022 (last updated February 24, 2025)
In Red Hat Openshift 1, weak default permissions are applied to the /etc/openshift/server_priv.pem file on the broker server, which could allow users with local access to the broker to read this file.
Attacker Value
Unknown

CVE-2013-4253

Disclosure Date: October 19, 2022 (last updated February 24, 2025)
The deployment script in the unsupported "OpenShift Extras" set of add-on scripts, in Red Hat Openshift 1, installs a default public key in the root user's authorized_keys file.