Логотип exploitDog
product: "kubernetes"
Консоль
Логотип exploitDog

exploitDog

product: "kubernetes"
Kubernetes

Kubernetesоткрытое программное обеспечение для оркестровки контейнеризированных приложений — автоматизации их развёртывания, масштабирования и координации в условиях кластера.

Релизный цикл, информация об уязвимостях

Продукт: Kubernetes
Вендор: kubernetes

График релизов

1.301.311.321.332024202520262027

Недавние уязвимости Kubernetes

Количество 318

debian логотип

CVE-2023-2727

почти 2 года назад

Users may be able to launch containers using images that are restricte ...

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2023-2727

почти 2 года назад

Users may be able to launch containers using images that are restricted by ImagePolicyWebhook when using ephemeral containers. Kubernetes clusters are only affected if the ImagePolicyWebhook admission plugin is used together with ephemeral containers.

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2023-2728

почти 2 года назад

Users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using ephemeral containers. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the `kubernetes.io/enforce-mountable-secrets` annotation are used together with ephemeral containers.

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2691-1

почти 2 года назад

Security update for kubernetes1.23

EPSS: Низкий
fstec логотип

BDU:2023-03305

почти 2 года назад

Уязвимость компонента GCP Provider инструмента автоматизированной системы обеспечения kOps программного средства управления кластерами виртуальных машин Kubernetes, позволяющая нарушителю повысить свои привилегии

CVSS3: 8
EPSS: Низкий
github логотип

GHSA-xc8m-28vv-4pjc

около 2 лет назад

Kubelet vulnerable to bypass of seccomp profile enforcement

CVSS3: 4.4
EPSS: Низкий
nvd логотип

CVE-2023-2431

около 2 лет назад

A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.

CVSS3: 3.4
EPSS: Низкий
debian логотип

CVE-2023-2431

около 2 лет назад

A security issue was discovered in Kubelet that allows pods to bypass ...

CVSS3: 3.4
EPSS: Низкий
ubuntu логотип

CVE-2023-2431

около 2 лет назад

A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.

CVSS3: 3.4
EPSS: Низкий
redhat логотип

CVE-2023-2431

около 2 лет назад

A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.

CVSS3: 3.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
debian логотип
CVE-2023-2727

Users may be able to launch containers using images that are restricte ...

CVSS3: 6.5
0%
Низкий
почти 2 года назад
ubuntu логотип
CVE-2023-2727

Users may be able to launch containers using images that are restricted by ImagePolicyWebhook when using ephemeral containers. Kubernetes clusters are only affected if the ImagePolicyWebhook admission plugin is used together with ephemeral containers.

CVSS3: 6.5
0%
Низкий
почти 2 года назад
ubuntu логотип
CVE-2023-2728

Users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using ephemeral containers. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the `kubernetes.io/enforce-mountable-secrets` annotation are used together with ephemeral containers.

CVSS3: 6.5
3%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:2691-1

Security update for kubernetes1.23

0%
Низкий
почти 2 года назад
fstec логотип
BDU:2023-03305

Уязвимость компонента GCP Provider инструмента автоматизированной системы обеспечения kOps программного средства управления кластерами виртуальных машин Kubernetes, позволяющая нарушителю повысить свои привилегии

CVSS3: 8
0%
Низкий
почти 2 года назад
github логотип
GHSA-xc8m-28vv-4pjc

Kubelet vulnerable to bypass of seccomp profile enforcement

CVSS3: 4.4
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-2431

A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.

CVSS3: 3.4
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-2431

A security issue was discovered in Kubelet that allows pods to bypass ...

CVSS3: 3.4
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-2431

A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.

CVSS3: 3.4
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-2431

A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.

CVSS3: 3.4
0%
Низкий
около 2 лет назад

Уязвимостей на страницу


Поделиться