Lucene search

K

5 matches found

CVE
CVE
added 2021/02/23 10:15 p.m.168 views

CVE-2021-20182

A privilege escalation flaw was found in openshift4/ose-docker-builder. The build container runs with high privileges using a chrooted environment instead of runc. If an attacker can gain access to this build container, they can potentially utilize the raw devices of the underlying node, such as th...

8.8CVSS9AI score0.0053EPSS
CVE
CVE
added 2021/07/30 8:15 p.m.110 views

CVE-2021-3636

It was found in OpenShift, before version 4.8, that the generated certificate for the in-cluster Service CA, incorrectly included additional certificates. The Service CA is automatically mounted into all pods, allowing them to safely connect to trusted in-cluster services that present certificates ...

4.6CVSS4.5AI score0.00045EPSS
CVE
CVE
added 2021/06/02 12:15 p.m.96 views

CVE-2020-14336

A flaw was found in the Restricted Security Context Constraints (SCC), where it allows pods to craft custom network packets. This flaw allows an attacker to cause a denial of service attack on an OpenShift Container Platform cluster if they can deploy pods. The highest threat from this vulnerabilit...

6.5CVSS6.1AI score0.00329EPSS
CVE
CVE
added 2021/06/02 2:15 p.m.53 views

CVE-2020-35514

An insecure modification flaw in the /etc/kubernetes/kubeconfig file was found in OpenShift. This flaw allows an attacker with access to a running container which mounts /etc/kubernetes or has local access to the node, to copy this kubeconfig file and attempt to add their own node to the OpenShift ...

7CVSS6.6AI score0.00041EPSS
CVE
CVE
added 2021/05/27 8:15 p.m.46 views

CVE-2020-1761

A flaw was found in the OpenShift web console, where the access token is stored in the browser's local storage. An attacker can use this flaw to get the access token via physical access, or an XSS attack on the victim's browser. This flaw affects openshift/console versions before openshift/console-...

6.1CVSS5.7AI score0.00157EPSS