Show filters
532 Total Results
Displaying 141-150 of 532
Sort by:
Attacker Value
Unknown
CVE-2023-0056
Disclosure Date: March 23, 2023 (last updated October 08, 2023)
An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.
0
Attacker Value
Unknown
CVE-2023-27561
Disclosure Date: March 03, 2023 (last updated October 08, 2023)
runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.
0
Attacker Value
Unknown
CVE-2023-0229
Disclosure Date: January 26, 2023 (last updated October 08, 2023)
A flaw was found in github.com/openshift/apiserver-library-go, used in OpenShift 4.12 and 4.11, that contains an issue that can allow low-privileged users to set the seccomp profile for pods they control to "unconfined." By default, the seccomp profile used in the restricted-v2 Security Context Constraint (SCC) is "runtime/default," allowing users to disable seccomp for pods they can create and modify.
0
Attacker Value
Unknown
CVE-2023-0296
Disclosure Date: January 17, 2023 (last updated October 08, 2023)
The Birthday attack against 64-bit block ciphers flaw (CVE-2016-2183) was reported for the health checks port (9979) on etcd grpc-proxy component. Even though the CVE-2016-2183 has been fixed in the etcd components, to enable periodic health checks from kubelet, it was necessary to open up a new port (9979) on etcd grpc-proxy, hence this port might be considered as still vulnerable to the same type of vulnerability. The health checks on etcd grpc-proxy do not contain sensitive data (only metrics data), therefore the potential impact related to this vulnerability is minimal. The CVE-2023-0296 has been assigned to this issue to track the permanent fix in the etcd component.
0
Attacker Value
Unknown
CVE-2021-4294
Disclosure Date: December 28, 2022 (last updated February 24, 2025)
A vulnerability was found in OpenShift OSIN. It has been classified as problematic. This affects the function ClientSecretMatches/CheckClientSecret. The manipulation of the argument secret leads to observable timing discrepancy. The name of the patch is 8612686d6dda34ae9ef6b5a974e4b7accb4fea29. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216987.
0
Attacker Value
Unknown
CVE-2022-3259
Disclosure Date: December 09, 2022 (last updated February 24, 2025)
Openshift 4.9 does not use HTTP Strict Transport Security (HSTS) which may allow man-in-the-middle (MITM) attacks.
0
Attacker Value
Unknown
CVE-2022-3262
Disclosure Date: December 08, 2022 (last updated February 24, 2025)
A flaw was found in Openshift. A pod with a DNSPolicy of "ClusterFirst" may incorrectly resolve the hostname based on a service provided. This flaw allows an attacker to supply an incorrect name with the DNS search policy, affecting confidentiality and availability.
0
Attacker Value
Unknown
CVE-2022-3260
Disclosure Date: December 08, 2022 (last updated February 24, 2025)
The response header has not enabled X-FRAME-OPTIONS, Which helps prevents against Clickjacking attack.. Some browsers would interpret these results incorrectly, allowing clickjacking attacks.
0
Attacker Value
Unknown
CVE-2013-4281
Disclosure Date: October 19, 2022 (last updated February 24, 2025)
In Red Hat Openshift 1, weak default permissions are applied to the /etc/openshift/server_priv.pem file on the broker server, which could allow users with local access to the broker to read this file.
0
Attacker Value
Unknown
CVE-2013-4253
Disclosure Date: October 19, 2022 (last updated February 24, 2025)
The deployment script in the unsupported "OpenShift Extras" set of add-on scripts, in Red Hat Openshift 1, installs a default public key in the root user's authorized_keys file.
0