Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2024-12401

Disclosure Date: December 12, 2024 (last updated December 21, 2024)
A flaw was found in the cert-manager package. This flaw allows an attacker who can modify PEM data that the cert-manager reads, for example, in a Secret resource, to use large amounts of CPU in the cert-manager controller pod to effectively create a denial-of-service (DoS) vector for the cert-manager in the cluster.
Attacker Value
Unknown

CVE-2024-3727

Disclosure Date: May 14, 2024 (last updated January 20, 2025)
A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.
0
Attacker Value
Unknown

CVE-2020-2121

Disclosure Date: February 12, 2020 (last updated October 26, 2023)
Jenkins Google Kubernetes Engine Plugin 0.8.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
Attacker Value
Unknown

CVE-2019-10445

Disclosure Date: October 16, 2019 (last updated October 26, 2023)
A missing permission check in Jenkins Google Kubernetes Engine Plugin 0.7.0 and earlier allowed attackers with Overall/Read permission to obtain limited information about the scope of a credential with an attacker-specified credentials ID.
Attacker Value
Unknown

CVE-2019-10365

Disclosure Date: July 31, 2019 (last updated October 26, 2023)
Jenkins Google Kubernetes Engine Plugin 0.6.2 and earlier created a temporary file containing a temporary access token in the project workspace, where it could be accessed by users with Job/Read permission.
Attacker Value
Unknown

CVE-2019-5736

Disclosure Date: February 11, 2019 (last updated November 08, 2023)
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.