Show filters
131 Total Results
Displaying 31-40 of 131
Sort by:
Attacker Value
Unknown
CVE-2022-3248
Disclosure Date: October 05, 2023 (last updated October 13, 2023)
A flaw was found in OpenShift API, as admission checks do not enforce "custom-host" permissions. This issue could allow an attacker to violate the boundaries, as permissions will not be applied.
0
Attacker Value
Unknown
CVE-2023-29332
Disclosure Date: September 12, 2023 (last updated October 08, 2023)
Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability
0
Attacker Value
Unknown
CVE-2023-2728
Disclosure Date: July 03, 2023 (last updated February 14, 2025)
Users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using ephemeral containers. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the `kubernetes.io/enforce-mountable-secrets` annotation are used together with ephemeral containers.
0
Attacker Value
Unknown
CVE-2023-2727
Disclosure Date: July 03, 2023 (last updated February 14, 2025)
Users may be able to launch containers using images that are restricted by ImagePolicyWebhook when using ephemeral containers. Kubernetes clusters are only affected if the ImagePolicyWebhook admission plugin is used together with ephemeral containers.
0
Attacker Value
Unknown
CVE-2023-2431
Disclosure Date: June 16, 2023 (last updated October 08, 2023)
A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.
0
Attacker Value
Unknown
CVE-2023-3027
Disclosure Date: June 05, 2023 (last updated October 08, 2023)
The grc-policy-propagator allows security escalation within the cluster. The propagator allows policies which contain some dynamically obtained values (instead of the policy apply a static manifest on a managed cluster) of taking advantage of cluster scoped access in a created policy. This feature does not restrict properly to lookup content from the namespace where the policy was created.
0
Attacker Value
Unknown
CVE-2023-33234
Disclosure Date: May 30, 2023 (last updated October 08, 2023)
Arbitrary code execution in Apache Airflow CNCF Kubernetes provider version 5.0.0 allows user to change xcom sidecar image and resources via Airflow connection.
In order to exploit this weakness, a user would already need elevated permissions (Op or Admin) to change the connection object in this manner. Operators should upgrade to provider version 7.0.0 which has removed the vulnerability.
0
Attacker Value
Unknown
CVE-2023-24594
Disclosure Date: May 03, 2023 (last updated October 09, 2023)
When an SSL profile is configured on a Virtual Server, undisclosed traffic can cause an increase in CPU or SSL accelerator resource utilization.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
0
Attacker Value
Unknown
CVE-2023-30513
Disclosure Date: April 12, 2023 (last updated October 08, 2023)
Jenkins Kubernetes Plugin 3909.v1f2c633e8590 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled.
0
Attacker Value
Unknown
CVE-2023-1065
Disclosure Date: February 28, 2023 (last updated October 08, 2023)
This vulnerability in the Snyk Kubernetes Monitor can result in irrelevant data being posted to a Snyk Organization, which could in turn obfuscate other, relevant, security issues. It does not expose the user of the integration to any direct security risk and no user data can be leaked. To exploit the vulnerability the attacker does not need to be authenticated to Snyk but does need to know the target's Integration ID (which may or may not be the same as the Organization ID, although this is an unpredictable UUID in either case).
0