Tags

InformationDisclosure [37] Reconnaissance [33] DataExposure [30] ConfigMapAccess [28] PotentialPrivilegeEscalation [27] Tampering [27] CredentialAccess [24] ClusterStructure [24] SecretAccess [23] ClusterWideSecretAccess [20] Persistence [20] PrivilegeEscalation [19] DenialOfService [20] WildcardPermission [16] ClusterWideAccess [15] RBACQuery [17] WebhookReconnaissance [14] WorkloadLifecycle [13] WorkloadExecution [14] LateralMovement [13] ControlPlaneDisruption [12] NodeAccess [12] LogAccess [11] NetworkManipulation [11] OperationalData [12] ServiceExposure [11] CriticalNamespace [10] StorageDetailsDisclosure [9] ClusterWideLogAccess [9] IdentityManagement [8] ResourceConfiguration [8] AvailabilityImpact [7] BindingToPrivilegedRole [7] CodeExecution [7] PodExec [7] QuotaTampering [7] RBACManipulation [7] DataLoss [5] LeaderElectionAbuse [6] ResourceDeletion [6] Spoofing [5] TrafficRedirection [5] ClusterAdminAccess [5] ClusterWidePodExec [5] CRDManipulation [5] ElevationOfPrivilege [5] NamespaceLifecycle [5] ResourceModification [4] DeprecatedFeature [4] Impersonation [3] ManInTheMiddle [4] PodSecurityPolicy [4] WebhookManipulation [4] ControllerRevisionTampering [2] CSRCreation [3] NamespaceAdmin [2] NetworkPolicyManagement [2] PodAttach [2] PodPortForward [2] SelfPermissionReviewQuery [2] StorageManipulation [3] TokenCreation [2] WorkloadDeployment [2] APIServerDoS [1] APIServiceManipulation [1] BackupAccess [1] CertificateManagement [1] ClusterWidePodAttach [1] ClusterWidePodPortForward [1] CSRApproval [1] NodeManipulation [1] SchedulingAbuse [1] NamespaceWideAccess [1]