CVE-2024-3177

CVSS v3 Score
2.7
Low

Vulnerability Description

A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated.

CVSS:2.7(Low)

When registering and activating a new system with Red Hat Satellite 6 if the new systems hostname is then reset to the hostname of a previously registered system the previously registered system will ...

CWE-202017
CVSS:2.7(Low)

cPanel before 68.0.15 allows use of an unreserved e-mail address in DNS zone SOA records (SEC-306).

CWE-202017
CVSS:2.7(Low)

cPanel before 68.0.15 does not block a username of postmaster, which might allow reception of private e-mail (SEC-326).

CWE-202017
CVSS:2.7(Low)

cPanel before 68.0.15 does not have a sufficient list of reserved usernames (SEC-327).

CWE-202017
CVSS:2.7(Low)

cPanel before 68.0.15 does not block a username of ssl (SEC-328).

CWE-202017
CVSS:2.7(Low)

cPanel before 68.0.15 allows user accounts to be partially created with invalid username formats (SEC-334).

CWE-202017