diff --git a/vulnerabilities/gcp-gke-autopilot-privesc.yaml b/vulnerabilities/gcp-2022-009.yaml similarity index 92% rename from vulnerabilities/gcp-gke-autopilot-privesc.yaml rename to vulnerabilities/gcp-2022-009.yaml index 85050c3..655eeb9 100644 --- a/vulnerabilities/gcp-gke-autopilot-privesc.yaml +++ b/vulnerabilities/gcp-2022-009.yaml @@ -1,12 +1,12 @@ title: GKE Autopilot cluster privilege esclation -slug: gke-autopilot-privesc +slug: gcp-2022-009 cves: null affectedPlatforms: - GCP affectedServices: -- Kubernetes Engine Autopilot +- GKE Autopilot image: https://images.unsplash.com/photo-1628251721369-9bab0845261e?ixlib=rb-4.0.3&ixid=M3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%3D%3D&auto=format&fit=crop&w=3132&q=80 -severity: Low +severity: Medium discoveredBy: name: null org: null @@ -28,4 +28,4 @@ detectionMethods: null contributor: https://github.com/ramimac references: - https://cloud.google.com/support/bulletins#gcp-2022-009 -- https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-009 \ No newline at end of file +- https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-009