CVE Database

Be on top of your Kubernetes security with the most comprehensive Kubernetes related CVE database

CUPS: Unraveling a Critical Vulnerability Chain in Unix Printing Systems

A series of critical vulnerabilities has been uncovered in the Common Unix Printing System (CUPS), specifically in the cups-browsed component and related libraries. This vulnerability chain allows remote, unauthenticated attackers to potentially execute arbitrary code with root privileges on affected systems...

Find out more
9.9

CVE-2024-7646 <br/> Ingress-NGINX Annotation Validation Bypass

A Kubernetes vulnerability which demands immediate attention from security professionals and DevOps teams. CVE-2024-7646, affect the popular ingress-nginx controller and allows malicious actors to bypass annotation validation and potentially gain unauthorized access to sensitive cluster resources...

Find out more
8.8

XZ vulnerability
CVE-2024-3094

March 29, 2024 - Red Hat disclosed CVE-2024-3094 (a.k.a XZ vulnerability) scoring a critical CVSS rating of 10. Stemming from a supply chain compromise it affects the latest iterations of XZ tools and libraries. The CVE was identified by a software engineer following the discovery of...

Find out more
10

3 new NGINX ingress controller vulnerabilities
CVE-2023-5043, CVE-2023-5044 and CVE-2022-4886

Oct 27, 2023 - Three security issues were reported by the Kubernetes security community, all of them related to the popular NGINX ingress component. CVE-2023-5043, CVE-2023-5044 and CVE-2022-4886 can be exploited by attacker to steal secret credentials from the cluster.

Find out more
8.8

Kubelet vulnerabilities on Windows nodes
CVE-2023-3676, CVE-2023-3955 and CVE-2023-3893

Aug 23, 2023 - The Kubernetes Security Response Committee disclosed three interrelated vulnerabilities affecting the Windows versions of Kubelet and the Kubernetes CSI proxy. These vulnerabilities pose a significant risk, allowing even users with limited permissions to escalate...

Find out more
8.8

Kyverno’s container image signature verification can be bypassed
CVE-2022-47633

Dec 21, 2022 - The vulnerability enables an attacker who is either running a malicious container image registry or is able to act as a proxy between the registry and Kyverno, to inject unsigned images into the protected cluster, bypassing the image verification policy. 

Find out more
8.1
Close
slack_logos Continue to Slack

Get the information you need directly from our experts!

new-messageContinue as a guest