all InfoSec news
CVE-2023-33234 (airflow_cncf_kubernetes)
May 30, 2023, 11:15 a.m. |
National Vulnerability Database web.nvd.nist.gov
In order to exploit this weakness, a user would already need elevated permissions (Op or Admin) to change the connection object in this manner. Operators should upgrade to provider version 7.0.0 which has removed the vulnerability.
airflow apache change cncf code code execution cve exploit kubernetes object order permissions resources upgrade version weakness
More from web.nvd.nist.gov / National Vulnerability Database
CVE-2023-45955 (lightstrip_firmware)
5 months, 3 weeks ago |
web.nvd.nist.gov
CVE-2023-21380 (android)
5 months, 4 weeks ago |
web.nvd.nist.gov
CVE-2023-21381 (android)
5 months, 4 weeks ago |
web.nvd.nist.gov
CVE-2023-21385 (android)
5 months, 4 weeks ago |
web.nvd.nist.gov
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Associate Principal Security Engineer
@ Activision Blizzard | Work from Home - CA
Security Engineer- Systems Integration
@ Meta | Bellevue, WA | Menlo Park, CA | New York City
Lead Security Engineer (Digital Forensic and IR Analyst)
@ Blue Yonder | Hyderabad
Senior Principal IAM Engineering Program Manager Cybersecurity
@ Providence | Redmond, WA, United States
Information Security Analyst II or III
@ Entergy | The Woodlands, Texas, United States