CVE-2024-29990 – Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-29990
Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del contenedor confidencial del servicio Microsoft Azure Kubernetes • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29990 • CWE-284: Improper Access Control •
CVE-2024-21400 – Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-21400
Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del contenedor confidencial del servicio Microsoft Azure Kubernetes • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2024-21403 – Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-21403
Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del contenedor confidencial del servicio Microsoft Azure Kubernetes • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21403 • CWE-552: Files or Directories Accessible to External Parties •
CVE-2024-21376 – Microsoft Azure Kubernetes Service Confidential Container Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-21376
Microsoft Azure Kubernetes Service Confidential Container Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código del contenedor confidencial del servicio Microsoft Azure Kubernetes • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21376 • CWE-284: Improper Access Control •
CVE-2023-44487 – HTTP/2 Rapid Reset Attack Vulnerability
https://notcve.org/view.php?id=CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. El protocolo HTTP/2 permite una denegación de servicio (consumo de recursos del servidor) porque la cancelación de solicitudes puede restablecer muchas transmisiones rápidamente, como se explotó en la naturaleza entre agosto y octubre de 2023. A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. • https://github.com/imabee101/CVE-2023-44487 https://github.com/studiogangster/CVE-2023-44487 https://github.com/bcdannyboy/CVE-2023-44487 https://github.com/sigridou/CVE-2023-44487- https://github.com/ByteHackr/CVE-2023-44487 https://github.com/ReToCode/golang-CVE-2023-44487 http://www.openwall.com/lists/oss-security/2023/10/13/4 http://www.openwall.com/lists/oss-security/2023/10/13/9 http://www.openwall.com/lists/oss-security/2023/10/18/4 http://www. • CWE-400: Uncontrolled Resource Consumption •