Show filters
131 Total Results
Displaying 71-80 of 131
Sort by:
Attacker Value
Unknown

CVE-2021-27075

Disclosure Date: March 11, 2021 (last updated November 28, 2024)
Azure Virtual Machine Information Disclosure Vulnerability
0
Attacker Value
Unknown

CVE-2021-24109

Disclosure Date: February 25, 2021 (last updated November 28, 2024)
Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability
0
Attacker Value
Unknown

CVE-2021-1677

Disclosure Date: January 12, 2021 (last updated February 22, 2025)
Azure Active Directory Pod Identity Spoofing Vulnerability
0
Attacker Value
Unknown

CVE-2020-8554

Disclosure Date: December 07, 2020 (last updated February 22, 2025)
Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect.
Attacker Value
Unknown

CVE-2020-25688

Disclosure Date: November 23, 2020 (last updated February 22, 2025)
A flaw was found in rhacm versions before 2.0.5 and before 2.1.0. Two internal service APIs were incorrectly provisioned using a test certificate from the source repository. This would result in all installations using the same certificates. If an attacker could observe network traffic internal to a cluster, they could use the private key to decode API requests that should be protected by TLS sessions, potentially obtaining information they would not otherwise be able to. These certificates are not used for service authentication, so no opportunity for impersonation or active MITM attacks were made possible.
Attacker Value
Unknown

CVE-2020-25655

Disclosure Date: November 09, 2020 (last updated February 22, 2025)
An issue was discovered in ManagedClusterView API, that could allow secrets to be disclosed to users without the correct permissions. Views created for an admin user would be made available for a short time to users with only view permission. In this short time window the user with view permission could read cluster secrets that should only be disclosed to admin users.
Attacker Value
Unknown

CVE-2020-2309

Disclosure Date: November 04, 2020 (last updated October 26, 2023)
A missing/An incorrect permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
Attacker Value
Unknown

CVE-2020-2307

Disclosure Date: November 04, 2020 (last updated October 26, 2023)
Jenkins Kubernetes Plugin 1.27.3 and earlier allows low-privilege users to access possibly sensitive Jenkins controller environment variables.
Attacker Value
Unknown

CVE-2020-2308

Disclosure Date: November 04, 2020 (last updated October 26, 2023)
A missing permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to list global pod template names.
Attacker Value
Unknown

CVE-2020-8563

Disclosure Date: October 15, 2020 (last updated February 22, 2025)
In Kubernetes clusters using VSphere as a cloud provider, with a logging level set to 4 or above, VSphere cloud credentials will be leaked in the cloud controller manager's log. This affects < v1.19.3.