Логотип exploitDog
product: "kubernetes"
Консоль
Логотип exploitDog

exploitDog

product: "kubernetes"
Kubernetes

Kubernetesоткрытое программное обеспечение для оркестровки контейнеризированных приложений — автоматизации их развёртывания, масштабирования и координации в условиях кластера.

Релизный цикл, информация об уязвимостях

Продукт: Kubernetes
Вендор: kubernetes

График релизов

1.321.331.342024202520262027

Недавние уязвимости Kubernetes

Количество 326

ubuntu логотип

CVE-2020-8564

почти 5 лет назад

In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This affects < v1.19.3, < v1.18.10, < v1.17.13.

CVSS3: 4.7
EPSS: Низкий
ubuntu логотип

CVE-2020-8566

почти 5 лет назад

In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager's logs during provisioning of Ceph RBD persistent claims. This affects < v1.19.3, < v1.18.10, < v1.17.13.

CVSS3: 4.7
EPSS: Низкий
ubuntu логотип

CVE-2020-8563

почти 5 лет назад

In Kubernetes clusters using VSphere as a cloud provider, with a logging level set to 4 or above, VSphere cloud credentials will be leaked in the cloud controller manager's log. This affects < v1.19.3.

CVSS3: 4.7
EPSS: Низкий
redhat логотип

CVE-2020-8554

почти 5 лет назад

Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect.

CVSS3: 6.3
EPSS: Средний
nvd логотип

CVE-2020-2309

около 5 лет назад

A missing/An incorrect permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2020-2308

около 5 лет назад

A missing permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to list global pod template names.

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2020-2307

около 5 лет назад

Jenkins Kubernetes Plugin 1.27.3 and earlier allows low-privilege users to access possibly sensitive Jenkins controller environment variables.

CVSS3: 4.3
EPSS: Низкий
redhat логотип

CVE-2020-2307

около 5 лет назад

Jenkins Kubernetes Plugin 1.27.3 and earlier allows low-privilege users to access possibly sensitive Jenkins controller environment variables.

CVSS3: 4.3
EPSS: Низкий
redhat логотип

CVE-2020-2308

около 5 лет назад

A missing permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to list global pod template names.

CVSS3: 4.3
EPSS: Низкий
redhat логотип

CVE-2020-2309

около 5 лет назад

A missing/An incorrect permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
ubuntu логотип
CVE-2020-8564

In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This affects < v1.19.3, < v1.18.10, < v1.17.13.

CVSS3: 4.7
0%
Низкий
почти 5 лет назад
ubuntu логотип
CVE-2020-8566

In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager's logs during provisioning of Ceph RBD persistent claims. This affects < v1.19.3, < v1.18.10, < v1.17.13.

CVSS3: 4.7
0%
Низкий
почти 5 лет назад
ubuntu логотип
CVE-2020-8563

In Kubernetes clusters using VSphere as a cloud provider, with a logging level set to 4 or above, VSphere cloud credentials will be leaked in the cloud controller manager's log. This affects < v1.19.3.

CVSS3: 4.7
0%
Низкий
почти 5 лет назад
redhat логотип
CVE-2020-8554

Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect.

CVSS3: 6.3
25%
Средний
почти 5 лет назад
nvd логотип
CVE-2020-2309

A missing/An incorrect permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVSS3: 4.3
0%
Низкий
около 5 лет назад
nvd логотип
CVE-2020-2308

A missing permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to list global pod template names.

CVSS3: 4.3
0%
Низкий
около 5 лет назад
nvd логотип
CVE-2020-2307

Jenkins Kubernetes Plugin 1.27.3 and earlier allows low-privilege users to access possibly sensitive Jenkins controller environment variables.

CVSS3: 4.3
0%
Низкий
около 5 лет назад
redhat логотип
CVE-2020-2307

Jenkins Kubernetes Plugin 1.27.3 and earlier allows low-privilege users to access possibly sensitive Jenkins controller environment variables.

CVSS3: 4.3
0%
Низкий
около 5 лет назад
redhat логотип
CVE-2020-2308

A missing permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to list global pod template names.

CVSS3: 4.3
0%
Низкий
около 5 лет назад
redhat логотип
CVE-2020-2309

A missing/An incorrect permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVSS3: 4.3
0%
Низкий
около 5 лет назад

Уязвимостей на страницу


Поделиться