Логотип exploitDog
bind:CVE-2016-3738
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-3738

Количество 3

Количество 3

redhat логотип

CVE-2016-3738

больше 9 лет назад

Red Hat OpenShift Enterprise 3.2 does not properly restrict access to STI builds, which allows remote authenticated users to access the Docker socket and gain privileges via vectors related to build-pod.

CVSS2: 6.5
EPSS: Низкий
nvd логотип

CVE-2016-3738

больше 9 лет назад

Red Hat OpenShift Enterprise 3.2 does not properly restrict access to STI builds, which allows remote authenticated users to access the Docker socket and gain privileges via vectors related to build-pod.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-6j4q-5h3q-823c

больше 3 лет назад

Red Hat OpenShift Enterprise 3.2 does not properly restrict access to STI builds, which allows remote authenticated users to access the Docker socket and gain privileges via vectors related to build-pod.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2016-3738

Red Hat OpenShift Enterprise 3.2 does not properly restrict access to STI builds, which allows remote authenticated users to access the Docker socket and gain privileges via vectors related to build-pod.

CVSS2: 6.5
1%
Низкий
больше 9 лет назад
nvd логотип
CVE-2016-3738

Red Hat OpenShift Enterprise 3.2 does not properly restrict access to STI builds, which allows remote authenticated users to access the Docker socket and gain privileges via vectors related to build-pod.

CVSS3: 8.8
1%
Низкий
больше 9 лет назад
github логотип
GHSA-6j4q-5h3q-823c

Red Hat OpenShift Enterprise 3.2 does not properly restrict access to STI builds, which allows remote authenticated users to access the Docker socket and gain privileges via vectors related to build-pod.

CVSS3: 8.8
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу