www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-18T17:51:22+00:00 www.secnews.physaphae.fr CVE Liste - Common Vulnerability Exposure CVE-2023-46254 capsule-proxy is a reverse proxy for Capsule kubernetes multi-tenancy framework. A bug in the RoleBinding reflector used by `capsule-proxy` gives ServiceAccount tenant owners the right to list Namespaces of other tenants backed by the same owner kind and name. For example consider two tenants `solar` and `wind`. Tenant `solar`, owned by a ServiceAccount named `tenant-owner` in the Namespace `solar`. Tenant `wind`, owned by a ServiceAccount named `tenant-owner` in the Namespace `wind`. The Tenant owner `solar` would be able to list the namespaces of the Tenant `wind` and vice-versa, although this is not correct. The bug introduces an exfiltration vulnerability since allows the listing of Namespace resources of other Tenants, although just in some specific conditions: 1. `capsule-proxy` runs with the `--disable-caching=false` (default value: `false`) and 2. Tenant owners are ServiceAccount, with the same resource name, but in different Namespaces. This vulnerability doesn\'t allow any privilege escalation on the outer tenant Namespace-scoped resources, since the Kubernetes RBAC is enforcing this. This issue has been addressed in version 0.4.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.]]> 2023-11-06T19:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46254 www.secnews.physaphae.fr/article.php?IdArticle=8406849 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-3893 A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes running kubernetes-csi-proxy may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes running kubernetes-csi-proxy.]]> 2023-11-03T18:15:08+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3893 www.secnews.physaphae.fr/article.php?IdArticle=8405517 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-5408 A privilege escalation flaw was found in the node restriction admission plugin of the kubernetes api server of OpenShift. A remote attacker who modifies the node role label could steer workloads from the control plane and etcd nodes onto different worker nodes and gain broader access to the cluster.]]> 2023-11-02T03:15:10+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5408 www.secnews.physaphae.fr/article.php?IdArticle=8404529 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-3676 A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.]]> 2023-10-31T21:15:08+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3676 www.secnews.physaphae.fr/article.php?IdArticle=8403764 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-3955 A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.]]> 2023-10-31T21:15:08+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3955 www.secnews.physaphae.fr/article.php?IdArticle=8403765 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-46194 2023-10-27T08:15:31+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46194 www.secnews.physaphae.fr/article.php?IdArticle=8401377 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-5044 Code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation.]]> 2023-10-25T20:15:18+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5044 www.secnews.physaphae.fr/article.php?IdArticle=8400594 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-44392 Garden provides automation for Kubernetes development and testing. Prior tov ersions 0.13.17 and 0.12.65, Garden has a dependency on the cryo library, which is vulnerable to code injection due to an insecure implementation of deserialization. Garden stores serialized objects using cryo in the Kubernetes `ConfigMap` resources prefixed with `test-result` and `run-result` to cache Garden test and run results. These `ConfigMaps` are stored either in the `garden-system` namespace or the configured user namespace. When a user invokes the command `garden test` or `garden run` objects stored in the `ConfigMap` are retrieved and deserialized. This can be used by an attacker with access to the Kubernetes cluster to store malicious objects in the `ConfigMap`, which can trigger a remote code execution on the users machine when cryo deserializes the object. In order to exploit this vulnerability, an attacker must have access to the Kubernetes cluster used to deploy garden remote environments. Further, a user must actively invoke either a `garden test` or `garden run` which has previously cached results. The issue has been patched in Garden versions `0.13.17` (Bonsai) and `0.12.65` (Acorn). Only Garden versions prior to these are vulnerable. No known workarounds are available.]]> 2023-10-09T20:15:10+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-44392 www.secnews.physaphae.fr/article.php?IdArticle=8393407 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-3361 A flaw was found in Red Hat OpenShift Data Science. When exporting a pipeline from the Elyra notebook pipeline editor as Python DSL or YAML, it reads S3 credentials from the cluster (ds pipeline server) and saves them in plain text in the generated output instead of an ID for a Kubernetes secret.]]> 2023-10-04T12:15:10+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3361 www.secnews.physaphae.fr/article.php?IdArticle=8391460 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-40026 Argo CD is a declarative continuous deployment framework for Kubernetes. In Argo CD versions prior to 2.3 (starting at least in v0.1.0, but likely in any version using Helm before 2.3), using a specifically-crafted Helm file could reference external Helm charts handled by the same repo-server to leak values, or files from the referenced Helm Chart. This was possible because Helm paths were predictable. The vulnerability worked by adding a Helm chart that referenced Helm resources from predictable paths. Because the paths of Helm charts were predictable and available on an instance of repo-server, it was possible to reference and then render the values and resources from other existing Helm charts regardless of permissions. While generally, secrets are not stored in these files, it was nevertheless possible to reference any values from these charts. This issue was fixed in Argo CD 2.3 and subsequent versions by randomizing Helm paths. User\'s still using Argo CD 2.3 or below are advised to update to a supported version. If this is not possible, disabling Helm chart rendering, or using an additional repo-server for each Helm chart would prevent possible exploitation.]]> 2023-09-27T21:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40026 www.secnews.physaphae.fr/article.php?IdArticle=8388823 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-41333 Cilium is a networking, observability, and security solution with an eBPF-based dataplane. An attacker with the ability to create or modify CiliumNetworkPolicy objects in a particular namespace is able to affect traffic on an entire Cilium cluster, potentially bypassing policy enforcement in other namespaces. By using a crafted `endpointSelector` that uses the `DoesNotExist` operator on the `reserved:init` label, the attacker can create policies that bypass namespace restrictions and affect the entire Cilium cluster. This includes potentially allowing or denying all traffic. This attack requires API server access, as described in the Kubernetes API Server Attacker section of the Cilium Threat Model. This issue has been resolved in Cilium versions 1.14.2, 1.13.7, and 1.12.14. As a workaround an admission webhook can be used to prevent the use of `endpointSelectors` that use the `DoesNotExist` operator on the `reserved:init` label in CiliumNetworkPolicies.]]> 2023-09-27T15:19:30+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41333 www.secnews.physaphae.fr/article.php?IdArticle=8388593 False Threat Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-39347 Cilium is a networking, observability, and security solution with an eBPF-based dataplane. An attacker with the ability to update pod labels can cause Cilium to apply incorrect network policies. This issue arises due to the fact that on pod update, Cilium incorrectly uses user-provided pod labels to select the policies which apply to the workload in question. This can affect Cilium network policies that use the namespace, service account or cluster constructs to restrict traffic, Cilium clusterwide network policies that use Cilium namespace labels to select the Pod and Kubernetes network policies. Non-existent construct names can be provided, which bypass all network policies applicable to the construct. For example, providing a pod with a non-existent namespace as the value of the `io.kubernetes.pod.namespace` label results in none of the namespaced CiliumNetworkPolicies applying to the pod in question. This attack requires the attacker to have Kubernetes API Server access, as described in the Cilium Threat Model. This issue has been resolved in: Cilium versions 1.14.2, 1.13.7, and 1.12.14. Users are advised to upgrade. As a workaround an admission webhook can be used to prevent pod label updates to the `k8s:io.kubernetes.pod.namespace` and `io.cilium.k8s.policy.*` keys.]]> 2023-09-27T15:18:55+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39347 www.secnews.physaphae.fr/article.php?IdArticle=8388489 False Threat Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-0923 A flaw was found in the Kubernetes service for notebooks in RHODS, where it does not prevent pods from other namespaces and applications from making requests to the Jupyter API. This flaw can lead to file content exposure and other issues.]]> 2023-09-15T21:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0923 www.secnews.physaphae.fr/article.php?IdArticle=8383912 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-41423 Cross Site Scripting vulnerability in WP Githuber MD plugin v.1.16.2 allows a remote attacker to execute arbitrary code via a crafted payload to the new article function.]]> 2023-09-12T22:15:08+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41423 www.secnews.physaphae.fr/article.php?IdArticle=8382088 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-29332 Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability]]> 2023-09-12T17:15:08+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29332 www.secnews.physaphae.fr/article.php?IdArticle=8381923 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-40584 Argo CD is a declarative continuous deployment for Kubernetes. All versions of ArgoCD starting from v2.4 have a bug where the ArgoCD repo-server component is vulnerable to a Denial-of-Service attack vector. Specifically, the said component extracts a user-controlled tar.gz file without validating the size of its inner files. As a result, a malicious, low-privileged user can send a malicious tar.gz file that exploits this vulnerability to the repo-server, thereby harming the system\'s functionality and availability. Additionally, the repo-server is susceptible to another vulnerability due to the fact that it does not check the extracted file permissions before attempting to delete them. Consequently, an attacker can craft a malicious tar.gz archive in a way that prevents the deletion of its inner files when the manifest generation process is completed. A patch for this vulnerability has been released in versions 2.6.15, 2.7.14, and 2.8.3. Users are advised to upgrade. The only way to completely resolve the issue is to upgrade, however users unable to upgrade should configure RBAC (Role-Based Access Control) and provide access for configuring applications only to a limited number of administrators. These administrators should utilize trusted and verified Helm charts.]]> 2023-09-07T23:15:10+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40584 www.secnews.physaphae.fr/article.php?IdArticle=8380259 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-40029 Argo CD is a declarative continuous deployment for Kubernetes. Argo CD Cluster secrets might be managed declaratively using Argo CD / kubectl apply. As a result, the full secret body is stored in`kubectl.kubernetes.io/last-applied-configuration` annotation. pull request #7139 introduced the ability to manage cluster labels and annotations. Since clusters are stored as secrets it also exposes the `kubectl.kubernetes.io/last-applied-configuration` annotation which includes full secret body. In order to view the cluster annotations via the Argo CD API, the user must have `clusters, get` RBAC access. **Note:** In many cases, cluster secrets do not contain any actually-secret information. But sometimes, as in bearer-token auth, the contents might be very sensitive. The bug has been patched in versions 2.8.3, 2.7.14, and 2.6.15. Users are advised to upgrade. Users unable to upgrade should update/deploy cluster secret with `server-side-apply` flag which does not use or rely on `kubectl.kubernetes.io/last-applied-configuration` annotation. Note: annotation for existing secrets will require manual removal.]]> 2023-09-07T23:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40029 www.secnews.physaphae.fr/article.php?IdArticle=8380258 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-40025 Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All versions of Argo CD starting from version 2.6.0 have a bug where open web terminal sessions do not expire. This bug allows users to send any websocket messages even if the token has already expired. The most straightforward scenario is when a user opens the terminal view and leaves it open for an extended period. This allows the user to view sensitive information even when they should have been logged out already. A patch for this vulnerability has been released in the following Argo CD versions: 2.6.14, 2.7.12 and 2.8.1.]]> 2023-08-23T20:15:08+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40025 www.secnews.physaphae.fr/article.php?IdArticle=8373842 False Tool,Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-37917 KubePi is an opensource kubernetes management panel. A normal user has permission to create/update users, they can become admin by editing the `isadmin` value in the request. As a result any user may take administrative control of KubePi. This issue has been addressed in version 1.6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.]]> 2023-07-21T21:15:11+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37917 www.secnews.physaphae.fr/article.php?IdArticle=8359915 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-37916 KubePi is an opensource kubernetes management panel. The endpoint /kubepi/api/v1/users/search?pageNum=1&&pageSize=10 leak password hash of any user (including admin). A sufficiently motivated attacker may be able to crack leaded password hashes. This issue has been addressed in version 1.6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.]]> 2023-07-21T21:15:11+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37916 www.secnews.physaphae.fr/article.php?IdArticle=8359914 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-36375 Cross Site Scripting vulnerability in Hostel Management System v2.1 allows an attacker to execute arbitrary code via a crafted payload to the Guardian name, Guardian relation, complimentary address, city, permanent address, and city parameters in the Book Hostel & Room Details page.]]> 2023-07-10T17:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36375 www.secnews.physaphae.fr/article.php?IdArticle=8354181 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-36376 Cross-Site Scripting (XSS) vulnerability in Hostel Management System v.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the add course section.]]> 2023-07-10T16:15:53+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36376 www.secnews.physaphae.fr/article.php?IdArticle=8354182 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-2728 Users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using ephemeral containers. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the `kubernetes.io/enforce-mountable-secrets` annotation are used together with ephemeral containers.]]> 2023-07-03T21:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2728 www.secnews.physaphae.fr/article.php?IdArticle=8351928 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-2727 Users may be able to launch containers using images that are restricted by ImagePolicyWebhook when using ephemeral containers. Kubernetes clusters are only affected if the ImagePolicyWebhook admission plugin is used together with ephemeral containers.]]> 2023-07-03T21:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2727 www.secnews.physaphae.fr/article.php?IdArticle=8351927 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-33190 Sealos is an open source cloud operating system distribution based on the Kubernetes kernel. In versions of Sealos prior to 4.2.0 an improper configuration of role based access control (RBAC) permissions resulted in an attacker being able to obtain cluster control permissions, which could control the entire cluster deployed with Sealos, as well as hundreds of pods and other resources within the cluster. This issue has been addressed in version 4.2.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.]]> 2023-06-29T19:15:08+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-33190 www.secnews.physaphae.fr/article.php?IdArticle=8350773 False Cloud Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-34647 PHPgurukl Hostel Management System v.1.0 is vulnerable to Cross Site Scripting (XSS).]]> 2023-06-28T22:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-34647 www.secnews.physaphae.fr/article.php?IdArticle=8350440 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-34652 PHPgurukl Hostel Management System v.1.0 is vulnerable to Cross Site Scripting (XSS) via Add New Course.]]> 2023-06-28T21:15:10+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-34652 www.secnews.physaphae.fr/article.php?IdArticle=8350412 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-35165 AWS Cloud Development Kit (AWS CDK) is an open-source software development framework to define cloud infrastructure in code and provision it through AWS CloudFormation. In the packages `aws-cdk-lib` 2.0.0 until 2.80.0 and `@aws-cdk/aws-eks` 1.57.0 until 1.202.0, `eks.Cluster` and `eks.FargateCluster` constructs create two roles, `CreationRole` and `default MastersRole`, that have an overly permissive trust policy. The first, referred to as the `CreationRole`, is used by lambda handlers to create the cluster and deploy Kubernetes resources (e.g `KubernetesManifest`, `HelmChart`, ...) onto it. Users with CDK version higher or equal to 1.62.0 (including v2 users) may be affected. The second, referred to as the `default MastersRole`, is provisioned only if the `mastersRole` property isn\'t provided and has permissions to execute `kubectl` commands on the cluster. Users with CDK version higher or equal to 1.57.0 (including v2 users) may be affected. The issue has been fixed in `@aws-cdk/aws-eks` v1.202.0 and `aws-cdk-lib` v2.80.0. These versions no longer use the account root principal. Instead, they restrict the trust policy to the specific roles of lambda handlers that need it. There is no workaround available for CreationRole. To avoid creating the `default MastersRole`, use the `mastersRole` property to explicitly provide a role.]]> 2023-06-23T21:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-35165 www.secnews.physaphae.fr/article.php?IdArticle=8348768 False Cloud Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-34242 Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to version 1.13.4, when Gateway API is enabled in Cilium, the absence of a check on the namespace in which a ReferenceGrant is created could result in Cilium unintentionally gaining visibility of secrets (including certificates) and services across namespaces. An attacker on an affected cluster can leverage this issue to use cluster secrets that should not be visible to them, or communicate with services that they should not have access to. Gateway API functionality is disabled by default. This vulnerability is fixed in Cilium release 1.13.4. As a workaround, restrict the creation of `ReferenceGrant` resources to admin users by using Kubernetes RBAC.]]> 2023-06-15T20:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-34242 www.secnews.physaphae.fr/article.php?IdArticle=8345959 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-2878 Kubernetes secrets-store-csi-driver in versions before 1.3.3 discloses service account tokens in logs.]]> 2023-06-07T15:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2878 www.secnews.physaphae.fr/article.php?IdArticle=8343081 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-0545 The Hostel WordPress plugin before 1.1.5.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).]]> 2023-06-05T14:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0545 www.secnews.physaphae.fr/article.php?IdArticle=8342227 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-34091 Kyverno is a policy engine designed for Kubernetes. In versions of Kyverno prior to 1.10.0, resources which have the `deletionTimestamp` field defined can bypass validate, generate, or mutate-existing policies, even in cases where the `validationFailureAction` field is set to `Enforce`. This situation occurs as resources pending deletion were being consciously exempted by Kyverno, as a way to reduce processing load as policies are typically not applied to objects which are being deleted. However, this could potentially result in allowing a malicious user to leverage the Kubernetes finalizers feature by setting a finalizer which causes the Kubernetes API server to set the `deletionTimestamp` and then not completing the delete operation as a way to explicitly to bypass a Kyverno policy. Note that this is not applicable to Kubernetes Pods but, as an example, a Kubernetes Service resource can be manipulated using an indefinite finalizer to bypass policies. This is resolved in Kyverno 1.10.0. There is no known workaround.]]> 2023-06-01T17:15:10+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-34091 www.secnews.physaphae.fr/article.php?IdArticle=8341311 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-22647 = 2,6.0 avant = 2,7.0 avant = 2.6.0 before < 2.6.13, from >= 2.7.0 before < 2.7.4.]]> 2023-06-01T13:15:10+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22647 www.secnews.physaphae.fr/article.php?IdArticle=8341230 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-33234 Arbitrary code execution in Apache Airflow CNCF Kubernetes provider version 5.0.0 allows user to change xcom sidecar image and resources via Airflow connection. In order to exploit this weakness, a user would already need elevated permissions (Op or Admin) to change the connection object in this manner.  Operators should upgrade to provider version 7.0.0 which has removed the vulnerability.]]> 2023-05-30T11:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-33234 www.secnews.physaphae.fr/article.php?IdArticle=8340507 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-33191 Kyverno is a policy engine designed for Kubernetes. Kyverno seccomp control can be circumvented. Users of the podSecurity `validate.podSecurity` subrule in Kyverno 1.9.2 and 1.9.3 are vulnerable. This issue was patched in version 1.9.4.]]> 2023-05-30T07:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-33191 www.secnews.physaphae.fr/article.php?IdArticle=8340472 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-25448 2023-05-22T15:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25448 www.secnews.physaphae.fr/article.php?IdArticle=8338469 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-30840 Fluid is an open source Kubernetes-native distributed dataset orchestrator and accelerator for data-intensive applications. Starting in version 0.7.0 and prior to version 0.8.6, if a malicious user gains control of a Kubernetes node running fluid csi pod (controlled by the `csi-nodeplugin-fluid` node-daemonset), they can leverage the fluid-csi service account to modify specs of all the nodes in the cluster. However, since this service account lacks `list node` permissions, the attacker may need to use other techniques to identify vulnerable nodes. Once the attacker identifies and modifies the node specs, they can manipulate system-level-privileged components to access all secrets in the cluster or execute pods on other nodes. This allows them to elevate privileges beyond the compromised node and potentially gain full privileged access to the whole cluster. To exploit this vulnerability, the attacker can make all other nodes unschedulable (for example, patch node with taints) and wait for system-critical components with high privilege to appear on the compromised node. However, this attack requires two prerequisites: a compromised node and identifying all vulnerable nodes through other means. Version 0.8.6 contains a patch for this issue. As a workaround, delete the `csi-nodeplugin-fluid` daemonset in `fluid-system` namespace and avoid using CSI mode to mount FUSE file systems. Alternatively, using sidecar mode to mount FUSE file systems is recommended.]]> 2023-05-08T18:15:14+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30840 www.secnews.physaphae.fr/article.php?IdArticle=8334409 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-22651 Improper Privilege Management vulnerability in SUSE Rancher allows Privilege Escalation. A failure in the update logic of Rancher\'s admission Webhook may lead to the misconfiguration of the Webhook. This component enforces validation rules and security checks before resources are admitted into the Kubernetes cluster. The issue only affects users that upgrade from 2.6.x or 2.7.x to 2.7.2. Users that did a fresh install of 2.7.2 (and did not follow an upgrade path) are not affected.]]> 2023-05-04T08:15:22+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22651 www.secnews.physaphae.fr/article.php?IdArticle=8333412 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-30841 Baremetal Operator (BMO) is a bare metal host provisioning integration for Kubernetes. Prior to version 0.3.0, ironic and ironic-inspector deployed within Baremetal Operator using the included `deploy.sh` store their `.htpasswd` files as ConfigMaps instead of Secrets. This causes the plain-text username and hashed password to be readable by anyone having a cluster-wide read-access to the management cluster, or access to the management cluster\'s Etcd storage. This issue is patched in baremetal-operator PR#1241, and is included in BMO release 0.3.0 onwards. As a workaround, users may modify the kustomizations and redeploy the BMO, or recreate the required ConfigMaps as Secrets per instructions in baremetal-operator PR#1241.]]> 2023-04-26T19:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30841 www.secnews.physaphae.fr/article.php?IdArticle=8331360 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-25490 2023-04-25T12:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25490 www.secnews.physaphae.fr/article.php?IdArticle=8330944 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-2250 A flaw was found in the Open Cluster Management (OCM) when a user have access to the worker nodes which has the cluster-manager-registration-controller or cluster-manager deployments. A malicious user can take advantage of this and bind the cluster-admin to any service account or using the service account to list all secrets for all kubernetes namespaces, leading into a cluster-level privilege escalation.]]> 2023-04-24T21:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2250 www.secnews.physaphae.fr/article.php?IdArticle=8330777 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-30622 Clusternet is a general-purpose system for controlling Kubernetes clusters across different environments. An issue in clusternet prior to version 0.15.2 can be leveraged to lead to a cluster-level privilege escalation. The clusternet has a deployment called `cluster-hub` inside the `clusternet-system` Kubernetes namespace, which runs on worker nodes randomly. The deployment has a service account called `clusternet-hub`, which has a cluster role called `clusternet:hub` via cluster role binding. The `clusternet:hub` cluster role has `"*" verbs of "*.*"` resources. Thus, if a malicious user can access the worker node which runs the clusternet, they can leverage the service account to do malicious actions to critical system resources. For example, the malicious user can leverage the service account to get ALL secrets in the entire cluster, resulting in cluster-level privilege escalation. Version 0.15.2 contains a fix for this issue.]]> 2023-04-24T16:15:07+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30622 www.secnews.physaphae.fr/article.php?IdArticle=8330698 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2018-17450 An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. There is Server-Side Request Forgery (SSRF) via the Kubernetes integration, leading (for example) to disclosure of a GCP service token.]]> 2023-04-15T23:15:13+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-17450 www.secnews.physaphae.fr/article.php?IdArticle=8328244 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-30513 Jenkins Kubernetes Plugin 3909.v1f2c633e8590 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled.]]> 2023-04-12T18:15:07+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30513 www.secnews.physaphae.fr/article.php?IdArticle=8327182 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-30512 CubeFS through 3.2.1 allows Kubernetes cluster-level privilege escalation. This occurs because DaemonSet has cfs-csi-cluster-role and can thus list all secrets, including the admin secret.]]> 2023-04-12T06:15:07+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30512 www.secnews.physaphae.fr/article.php?IdArticle=8327045 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-28114 `cilium-cli` is the command line interface to install, manage, and troubleshoot Kubernetes clusters running Cilium. Prior to version 0.13.2,`cilium-cli`, when used to configure cluster mesh functionality, can remove the enforcement of user permissions on the `etcd` store used to mirror local cluster information to remote clusters. Users who have set up cluster meshes using the Cilium Helm chart are not affected by this issue. Due to an incorrect mount point specification, the settings specified by the `initContainer` that configures `etcd` users and their permissions are overwritten when using `cilium-cli` to configure a cluster mesh. An attacker who has already gained access to a valid key and certificate for an `etcd` cluster compromised in this manner could then modify state in that `etcd` cluster. This issue is patched in `cilium-cli` 0.13.2. As a workaround, one may use Cilium\'s Helm charts to create their cluster.]]> 2023-03-22T19:15:12+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28114 www.secnews.physaphae.fr/article.php?IdArticle=8320706 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-27595 2023-03-17T22:15:11+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27595 www.secnews.physaphae.fr/article.php?IdArticle=8319533 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-27593 2023-03-17T20:15:13+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27593 www.secnews.physaphae.fr/article.php?IdArticle=8319518 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-28110 2023-03-16T17:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28110 www.secnews.physaphae.fr/article.php?IdArticle=8319217 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-26484 2023-03-15T21:15:08+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26484 www.secnews.physaphae.fr/article.php?IdArticle=8318939 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-27484 2023-03-09T21:15:11+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27484 www.secnews.physaphae.fr/article.php?IdArticle=8317107 False Guideline Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-27483 2023-03-09T21:15:11+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27483 www.secnews.physaphae.fr/article.php?IdArticle=8317106 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-3294 2023-03-01T19:15:25+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3294 www.secnews.physaphae.fr/article.php?IdArticle=8314780 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-1065 2023-02-28T19:15:16+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1065 www.secnews.physaphae.fr/article.php?IdArticle=8314395 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-23947 2023-02-16T18:15:11+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23947 www.secnews.physaphae.fr/article.php?IdArticle=8310941 False Tool,Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-24619 2023-02-13T19:15:11+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24619 www.secnews.physaphae.fr/article.php?IdArticle=8309788 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-25163 2023-02-08T21:15:10+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25163 www.secnews.physaphae.fr/article.php?IdArticle=8308422 False Spam,Tool,Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-25165 2023-02-08T20:15:24+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25165 www.secnews.physaphae.fr/article.php?IdArticle=8308394 False Tool Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-24425 2023-01-26T21:18:16+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24425 www.secnews.physaphae.fr/article.php?IdArticle=8304639 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-22736 2023-01-26T21:18:13+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22736 www.secnews.physaphae.fr/article.php?IdArticle=8304612 False Tool,Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-22482 2023-01-26T21:18:12+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22482 www.secnews.physaphae.fr/article.php?IdArticle=8304606 False Tool,Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-22480 2023-01-14T01:15:15+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22480 www.secnews.physaphae.fr/article.php?IdArticle=8301074 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-22478 2023-01-14T01:15:14+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22478 www.secnews.physaphae.fr/article.php?IdArticle=8301073 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-3841 2023-01-13T06:15:11+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3841 www.secnews.physaphae.fr/article.php?IdArticle=8300864 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2023-22479 2023-01-10T21:15:12+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22479 www.secnews.physaphae.fr/article.php?IdArticle=8299834 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-23509 = v0.12.0 released on 08/12/2022.]]> 2023-01-09T14:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23509 www.secnews.physaphae.fr/article.php?IdArticle=8299267 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-23508 = v0.12.0 released on 08/12/2022. ### Workarounds There is no workaround for this vulnerability. ### References Disclosed by Paulo Gomes, Senior Software Engineer, Weaveworks. ### For more information If you have any questions or comments about this advisory: - Open an issue in [Weave GitOps repository](https://github.com/weaveworks/weave-gitops) - Email us at [support@weave.works](mailto:support@weave.works)]]> 2023-01-09T13:15:10+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23508 www.secnews.physaphae.fr/article.php?IdArticle=8299266 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-47633 2022-12-23T23:15:08+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47633 www.secnews.physaphae.fr/article.php?IdArticle=8294391 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-23551 2022-12-21T20:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23551 www.secnews.physaphae.fr/article.php?IdArticle=8293495 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-4515 2022-12-20T19:15:25+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4515 www.secnews.physaphae.fr/article.php?IdArticle=8293180 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-23526 2022-12-15T19:15:17+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23526 www.secnews.physaphae.fr/article.php?IdArticle=8291702 False Tool Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-23525 2022-12-15T19:15:17+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23525 www.secnews.physaphae.fr/article.php?IdArticle=8291701 False Tool Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-23524 2022-12-15T19:15:16+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23524 www.secnews.physaphae.fr/article.php?IdArticle=8291700 False Tool Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-23471 2022-12-07T23:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23471 www.secnews.physaphae.fr/article.php?IdArticle=8288923 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-46167 2022-12-02T19:15:11+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46167 www.secnews.physaphae.fr/article.php?IdArticle=8286868 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-45933 2022-11-27T03:15:11+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45933 www.secnews.physaphae.fr/article.php?IdArticle=8252078 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-41939 2022-11-19T01:15:13+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41939 www.secnews.physaphae.fr/article.php?IdArticle=8105062 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-39272 2022-10-22T00:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39272 www.secnews.physaphae.fr/article.php?IdArticle=7622020 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-39278 2022-10-13T23:15:11+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39278 www.secnews.physaphae.fr/article.php?IdArticle=7445043 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-37968 2022-10-11T19:15:12+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-37968 www.secnews.physaphae.fr/article.php?IdArticle=7397787 False None Uber 5.0000000000000000 CVE Liste - Common Vulnerability Exposure CVE-2022-36103 2022-09-13T17:15:08+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36103 www.secnews.physaphae.fr/article.php?IdArticle=6872795 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-36049 2022-09-07T21:15:08+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36049 www.secnews.physaphae.fr/article.php?IdArticle=6774470 False Tool,Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2021-36782 2022-09-07T09:15:08+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36782 www.secnews.physaphae.fr/article.php?IdArticle=6765502 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-2238 2022-09-01T21:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2238 www.secnews.physaphae.fr/article.php?IdArticle=6672364 False Vulnerability,Guideline Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-1902 2022-09-01T21:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1902 www.secnews.physaphae.fr/article.php?IdArticle=6672346 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-36055 2022-09-01T13:15:08+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36055 www.secnews.physaphae.fr/article.php?IdArticle=6666260 False Tool Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-36035 2022-08-31T15:15:08+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36035 www.secnews.physaphae.fr/article.php?IdArticle=6648917 False Tool,Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-31677 2022-08-29T15:15:10+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31677 www.secnews.physaphae.fr/article.php?IdArticle=6614440 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2021-4178 2022-08-24T16:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4178 www.secnews.physaphae.fr/article.php?IdArticle=6506187 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-35976 2022-08-18T19:15:14+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35976 www.secnews.physaphae.fr/article.php?IdArticle=6399396 False Vulnerability,Guideline Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-35930 2022-08-04T22:15:08+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35930 www.secnews.physaphae.fr/article.php?IdArticle=6133263 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-31102 2022-07-12T22:15:08+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31102 www.secnews.physaphae.fr/article.php?IdArticle=5679745 False Tool,Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-31105 2022-07-12T22:15:08+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31105 www.secnews.physaphae.fr/article.php?IdArticle=5679746 False Tool,Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-22472 2022-06-30T17:15:07+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22472 www.secnews.physaphae.fr/article.php?IdArticle=5475204 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-31098 2022-06-27T22:15:09+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31098 www.secnews.physaphae.fr/article.php?IdArticle=5424287 False Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-31077 2022-06-27T21:15:07+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31077 www.secnews.physaphae.fr/article.php?IdArticle=5423408 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-31036 =v2.3.0 and do not have any Helm-type Applications you may disable the Helm config management tool as a workaround.]]> 2022-06-27T20:15:08+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31036 www.secnews.physaphae.fr/article.php?IdArticle=5423402 False Tool,Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-31076 2022-06-27T20:15:08+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31076 www.secnews.physaphae.fr/article.php?IdArticle=5423407 False None Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-31035 2022-06-27T19:15:08+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31035 www.secnews.physaphae.fr/article.php?IdArticle=5422524 False Tool,Vulnerability Uber None CVE Liste - Common Vulnerability Exposure CVE-2022-31034 2022-06-27T19:15:08+00:00 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31034 www.secnews.physaphae.fr/article.php?IdArticle=5422523 False Tool,Vulnerability Uber None