{"uuid": "ceccac1b-7829-41eb-ade3-2bc0f87258d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-24348", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5367", "content": "#Threat_Research\n1. CVE-2022-24348:\nCharts can be used to steal sensitive information from Argo CD deployments\nhttps://apiiro.com/blog/malicious-kubernetes-helm-charts-can-be-used-to-steal-sensitive-information-from-argo-cd-deployments\n2. Shadow Credentials\nhttps://pentestlab.blog/2022/02/07/shadow-credentials", "creation_timestamp": "2022-02-08T11:01:01.000000Z"}