NPM package potentially vulnerable to dependency confusion attack
A Dependency Confusion attack occurs when a software installer script is tricked into pulling a malicious package from a public...
A Dependency Confusion attack occurs when a software installer script is tricked into pulling a malicious package from a public...
Docker Socket '{DockerSocket}' was found to have mounted sockets. Docker socket is the UNIX socket that Docker is listening to....
A Dependency Confusion attack occurs when a software installer script is tricked into pulling a malicious package from a public...
It was found that a few redundant services are running on the server. As a best practice, it is recommended...
RDS database cluster ""{AwsRdsDbCluster}"" is using an unsupported engine version. The database engine is ""{AwsRdsDbCluster.Engine}"" and the current version being...
A VMware virtual machine is a software-based emulation of a physical computer. It was detected that the VMware VM {VmwareVm.Name}...
Kubelet communication contains sensitive parameters that should remain encrypted in transit. Orca has detected that the --tls-cert-file or --tls-private-key-file arguments...
The kubelet reads various parameters, including security settings, from a config file. When the anonymous-auth flag is enabled, requests that...
The kubelet reads various parameters, including security settings, from a config file. When AuthorizationMode is set to 'AlwaysAllow', the kubelet...