Show filters
133 Total Results
Displaying 31-40 of 133
Sort by:
Attacker Value
Unknown
CVE-2020-10752
Disclosure Date: June 12, 2020 (last updated February 21, 2025)
A flaw was found in the OpenShift API Server, where it failed to sufficiently protect OAuthTokens by leaking them into the logs when an API Server panic occurred. This flaw allows an attacker with the ability to cause an API Server error to read the logs, and use the leaked OAuthToken to log into the API Server with the leaked token.
0
Attacker Value
Unknown
CVE-2020-7013
Disclosure Date: June 03, 2020 (last updated February 21, 2025)
Kibana versions before 6.8.9 and 7.7.0 contain a prototype pollution flaw in TSVB. An authenticated attacker with privileges to create TSVB visualizations could insert data that would cause Kibana to execute arbitrary code. This could possibly lead to an attacker executing code with the permissions of the Kibana process on the host system.
0
Attacker Value
Unknown
CVE-2020-1741
Disclosure Date: April 24, 2020 (last updated February 21, 2025)
A flaw was found in openshift-ansible. OpenShift Container Platform (OCP) 3.11 is too permissive in the way it specified CORS allowed origins during installation. An attacker, able to man-in-the-middle the connection between the user's browser and the openshift console, could use this flaw to perform a phishing attack. The main threat from this vulnerability is data confidentiality.
0
Attacker Value
Unknown
CVE-2020-10696
Disclosure Date: March 31, 2020 (last updated February 21, 2025)
A path traversal flaw was found in Buildah in versions before 1.14.5. This flaw allows an attacker to trick a user into building a malicious container image hosted on an HTTP(s) server and then write files to the user's system anywhere that the user has permissions.
0
Attacker Value
Unknown
CVE-2020-1706
Disclosure Date: March 09, 2020 (last updated February 21, 2025)
It has been found that in openshift-enterprise version 3.11 and openshift-enterprise versions 4.1 up to, including 4.3, multiple containers modify the permissions of /etc/passwd to make them modifiable by users other than root. An attacker with access to the running container can exploit this to modify /etc/passwd to add a user and escalate their privileges. This CVE is specific to the openshift/apb-tools-container.
0
Attacker Value
Unknown
CVE-2020-8945
Disclosure Date: February 12, 2020 (last updated February 21, 2025)
The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by Docker or CRI-O. This leads to a crash or potential code execution during GPG signature verification.
0
Attacker Value
Unknown
CVE-2020-1708
Disclosure Date: February 07, 2020 (last updated February 21, 2025)
It has been found in openshift-enterprise version 3.11 and all openshift-enterprise versions from 4.1 to, including 4.3, that multiple containers modify the permissions of /etc/passwd to make them modifiable by users other than root. An attacker with access to the running container can exploit this to modify /etc/passwd to add a user and escalate their privileges. This CVE is specific to the openshift/mysql-apb.
0
Attacker Value
Unknown
CVE-2019-14819
Disclosure Date: January 07, 2020 (last updated February 21, 2025)
A flaw was found during the upgrade of an existing OpenShift Container Platform 3.x cluster. Using CRI-O, the dockergc service account is assigned to the current namespace of the user performing the upgrade. This flaw can allow an unprivileged user to escalate their privileges to those allowed by the privileged Security Context Constraints.
0
Attacker Value
Unknown
CVE-2019-13734
Disclosure Date: December 10, 2019 (last updated November 08, 2023)
Out of bounds write in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
0
Attacker Value
Unknown
Kubernetes CSI volume snapshot, cloning and resizing features can result in una…
Disclosure Date: December 05, 2019 (last updated November 08, 2023)
Improper input validation in Kubernetes CSI sidecar containers for external-provisioner (<v0.4.3, <v1.0.2, v1.1, <v1.2.2, <v1.3.1), external-snapshotter (<v0.4.2, <v1.0.2, v1.1, <1.2.2), and external-resizer (v0.1, v0.2) could result in unauthorized PersistentVolume data access or volume mutation during snapshot, restore from snapshot, cloning and resizing operations.
0