Логотип exploitDog
bind:CVE-2023-0229
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-0229

Количество 3

Количество 3

redhat логотип

CVE-2023-0229

около 3 лет назад

A flaw was found in github.com/openshift/apiserver-library-go, used in OpenShift 4.12 and 4.11, that contains an issue that can allow low-privileged users to set the seccomp profile for pods they control to "unconfined." By default, the seccomp profile used in the restricted-v2 Security Context Constraint (SCC) is "runtime/default," allowing users to disable seccomp for pods they can create and modify.

CVSS3: 6.3
EPSS: Низкий
nvd логотип

CVE-2023-0229

около 3 лет назад

A flaw was found in github.com/openshift/apiserver-library-go, used in OpenShift 4.12 and 4.11, that contains an issue that can allow low-privileged users to set the seccomp profile for pods they control to "unconfined." By default, the seccomp profile used in the restricted-v2 Security Context Constraint (SCC) is "runtime/default," allowing users to disable seccomp for pods they can create and modify.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-5465-xc2j-6p84

около 3 лет назад

github.com/openshift/apiserver-library-go Improper Input Validation vulnerability

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2023-0229

A flaw was found in github.com/openshift/apiserver-library-go, used in OpenShift 4.12 and 4.11, that contains an issue that can allow low-privileged users to set the seccomp profile for pods they control to "unconfined." By default, the seccomp profile used in the restricted-v2 Security Context Constraint (SCC) is "runtime/default," allowing users to disable seccomp for pods they can create and modify.

CVSS3: 6.3
0%
Низкий
около 3 лет назад
nvd логотип
CVE-2023-0229

A flaw was found in github.com/openshift/apiserver-library-go, used in OpenShift 4.12 and 4.11, that contains an issue that can allow low-privileged users to set the seccomp profile for pods they control to "unconfined." By default, the seccomp profile used in the restricted-v2 Security Context Constraint (SCC) is "runtime/default," allowing users to disable seccomp for pods they can create and modify.

CVSS3: 6.3
0%
Низкий
около 3 лет назад
github логотип
GHSA-5465-xc2j-6p84

github.com/openshift/apiserver-library-go Improper Input Validation vulnerability

CVSS3: 6.3
0%
Низкий
около 3 лет назад

Уязвимостей на страницу