Логотип exploitDog
product: "kubernetes"
Консоль
Логотип exploitDog

exploitDog

product: "kubernetes"

Количество 326

Количество 326

ubuntu логотип

CVE-2021-25737

больше 4 лет назад

A security issue was discovered in Kubernetes where a user may be able to redirect pod traffic to private networks on a Node. Kubernetes already prevents creation of Endpoint IPs in the localhost or link-local range, but the same validation was not performed on EndpointSlice IPs.

CVSS3: 2.7
EPSS: Низкий
redhat логотип

CVE-2021-25737

больше 4 лет назад

A security issue was discovered in Kubernetes where a user may be able to redirect pod traffic to private networks on a Node. Kubernetes already prevents creation of Endpoint IPs in the localhost or link-local range, but the same validation was not performed on EndpointSlice IPs.

CVSS3: 2.7
EPSS: Низкий
nvd логотип

CVE-2021-25737

больше 4 лет назад

A security issue was discovered in Kubernetes where a user may be able to redirect pod traffic to private networks on a Node. Kubernetes already prevents creation of Endpoint IPs in the localhost or link-local range, but the same validation was not performed on EndpointSlice IPs.

CVSS3: 2.7
EPSS: Низкий
debian логотип

CVE-2021-25737

больше 4 лет назад

A security issue was discovered in Kubernetes where a user may be able ...

CVSS3: 2.7
EPSS: Низкий
ubuntu логотип

CVE-2021-25736

около 2 лет назад

Kube-proxy on Windows can unintentionally forward traffic to local processes listening on the same port (“spec.ports[*].port”) as a LoadBalancer Service when the LoadBalancer controller does not set the “status.loadBalancer.ingress[].ip” field. Clusters where the LoadBalancer controller sets the “status.loadBalancer.ingress[].ip” field are unaffected.

CVSS3: 5.8
EPSS: Низкий
redhat логотип

CVE-2021-25736

больше 4 лет назад

Kube-proxy on Windows can unintentionally forward traffic to local processes listening on the same port (“spec.ports[*].port”) as a LoadBalancer Service when the LoadBalancer controller does not set the “status.loadBalancer.ingress[].ip” field. Clusters where the LoadBalancer controller sets the “status.loadBalancer.ingress[].ip” field are unaffected.

CVSS3: 5.8
EPSS: Низкий
nvd логотип

CVE-2021-25736

около 2 лет назад

Kube-proxy on Windows can unintentionally forward traffic to local processes listening on the same port (“spec.ports[*].port”) as a LoadBalancer Service when the LoadBalancer controller does not set the “status.loadBalancer.ingress[].ip” field. Clusters where the LoadBalancer controller sets the “status.loadBalancer.ingress[].ip” field are unaffected.

CVSS3: 5.8
EPSS: Низкий
debian логотип

CVE-2021-25736

около 2 лет назад

Kube-proxy on Windows can unintentionally forward traffic to local pr ...

CVSS3: 5.8
EPSS: Низкий
ubuntu логотип

CVE-2021-25735

больше 4 лет назад

A security issue was discovered in kube-apiserver that could allow node updates to bypass a Validating Admission Webhook. Clusters are only affected by this vulnerability if they run a Validating Admission Webhook for Nodes that denies admission based at least partially on the old state of the Node object. Validating Admission Webhook does not observe some previous fields.

CVSS3: 6.5
EPSS: Средний
redhat логотип

CVE-2021-25735

больше 4 лет назад

A security issue was discovered in kube-apiserver that could allow node updates to bypass a Validating Admission Webhook. Clusters are only affected by this vulnerability if they run a Validating Admission Webhook for Nodes that denies admission based at least partially on the old state of the Node object. Validating Admission Webhook does not observe some previous fields.

CVSS3: 6.5
EPSS: Средний
nvd логотип

CVE-2021-25735

больше 4 лет назад

A security issue was discovered in kube-apiserver that could allow node updates to bypass a Validating Admission Webhook. Clusters are only affected by this vulnerability if they run a Validating Admission Webhook for Nodes that denies admission based at least partially on the old state of the Node object. Validating Admission Webhook does not observe some previous fields.

CVSS3: 6.5
EPSS: Средний
debian логотип

CVE-2021-25735

больше 4 лет назад

A security issue was discovered in kube-apiserver that could allow nod ...

CVSS3: 6.5
EPSS: Средний
nvd логотип

CVE-2021-21661

больше 4 лет назад

Jenkins Kubernetes CLI Plugin 1.10.0 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVSS3: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2020-8566

около 5 лет назад

In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager's logs during provisioning of Ceph RBD persistent claims. This affects < v1.19.3, < v1.18.10, < v1.17.13.

CVSS3: 4.7
EPSS: Низкий
redhat логотип

CVE-2020-8566

около 5 лет назад

In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager's logs during provisioning of Ceph RBD persistent claims. This affects < v1.19.3, < v1.18.10, < v1.17.13.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2020-8566

около 5 лет назад

In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager's logs during provisioning of Ceph RBD persistent claims. This affects < v1.19.3, < v1.18.10, < v1.17.13.

CVSS3: 4.7
EPSS: Низкий
debian логотип

CVE-2020-8566

около 5 лет назад

In Kubernetes clusters using Ceph RBD as a storage provisioner, with l ...

CVSS3: 4.7
EPSS: Низкий
ubuntu логотип

CVE-2020-8565

около 5 лет назад

In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects <= v1.19.3, <= v1.18.10, <= v1.17.13, < v1.20.0-alpha2.

CVSS3: 4.7
EPSS: Низкий
redhat логотип

CVE-2020-8565

около 5 лет назад

In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects <= v1.19.3, <= v1.18.10, <= v1.17.13, < v1.20.0-alpha2.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2020-8565

около 5 лет назад

In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects <= v1.19.3, <= v1.18.10, <= v1.17.13, < v1.20.0-alpha2.

CVSS3: 4.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-25737

A security issue was discovered in Kubernetes where a user may be able to redirect pod traffic to private networks on a Node. Kubernetes already prevents creation of Endpoint IPs in the localhost or link-local range, but the same validation was not performed on EndpointSlice IPs.

CVSS3: 2.7
0%
Низкий
больше 4 лет назад
redhat логотип
CVE-2021-25737

A security issue was discovered in Kubernetes where a user may be able to redirect pod traffic to private networks on a Node. Kubernetes already prevents creation of Endpoint IPs in the localhost or link-local range, but the same validation was not performed on EndpointSlice IPs.

CVSS3: 2.7
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-25737

A security issue was discovered in Kubernetes where a user may be able to redirect pod traffic to private networks on a Node. Kubernetes already prevents creation of Endpoint IPs in the localhost or link-local range, but the same validation was not performed on EndpointSlice IPs.

CVSS3: 2.7
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-25737

A security issue was discovered in Kubernetes where a user may be able ...

CVSS3: 2.7
0%
Низкий
больше 4 лет назад
ubuntu логотип
CVE-2021-25736

Kube-proxy on Windows can unintentionally forward traffic to local processes listening on the same port (“spec.ports[*].port”) as a LoadBalancer Service when the LoadBalancer controller does not set the “status.loadBalancer.ingress[].ip” field. Clusters where the LoadBalancer controller sets the “status.loadBalancer.ingress[].ip” field are unaffected.

CVSS3: 5.8
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2021-25736

Kube-proxy on Windows can unintentionally forward traffic to local processes listening on the same port (“spec.ports[*].port”) as a LoadBalancer Service when the LoadBalancer controller does not set the “status.loadBalancer.ingress[].ip” field. Clusters where the LoadBalancer controller sets the “status.loadBalancer.ingress[].ip” field are unaffected.

CVSS3: 5.8
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-25736

Kube-proxy on Windows can unintentionally forward traffic to local processes listening on the same port (“spec.ports[*].port”) as a LoadBalancer Service when the LoadBalancer controller does not set the “status.loadBalancer.ingress[].ip” field. Clusters where the LoadBalancer controller sets the “status.loadBalancer.ingress[].ip” field are unaffected.

CVSS3: 5.8
0%
Низкий
около 2 лет назад
debian логотип
CVE-2021-25736

Kube-proxy on Windows can unintentionally forward traffic to local pr ...

CVSS3: 5.8
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2021-25735

A security issue was discovered in kube-apiserver that could allow node updates to bypass a Validating Admission Webhook. Clusters are only affected by this vulnerability if they run a Validating Admission Webhook for Nodes that denies admission based at least partially on the old state of the Node object. Validating Admission Webhook does not observe some previous fields.

CVSS3: 6.5
18%
Средний
больше 4 лет назад
redhat логотип
CVE-2021-25735

A security issue was discovered in kube-apiserver that could allow node updates to bypass a Validating Admission Webhook. Clusters are only affected by this vulnerability if they run a Validating Admission Webhook for Nodes that denies admission based at least partially on the old state of the Node object. Validating Admission Webhook does not observe some previous fields.

CVSS3: 6.5
18%
Средний
больше 4 лет назад
nvd логотип
CVE-2021-25735

A security issue was discovered in kube-apiserver that could allow node updates to bypass a Validating Admission Webhook. Clusters are only affected by this vulnerability if they run a Validating Admission Webhook for Nodes that denies admission based at least partially on the old state of the Node object. Validating Admission Webhook does not observe some previous fields.

CVSS3: 6.5
18%
Средний
больше 4 лет назад
debian логотип
CVE-2021-25735

A security issue was discovered in kube-apiserver that could allow nod ...

CVSS3: 6.5
18%
Средний
больше 4 лет назад
nvd логотип
CVE-2021-21661

Jenkins Kubernetes CLI Plugin 1.10.0 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVSS3: 4.3
0%
Низкий
больше 4 лет назад
ubuntu логотип
CVE-2020-8566

In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager's logs during provisioning of Ceph RBD persistent claims. This affects < v1.19.3, < v1.18.10, < v1.17.13.

CVSS3: 4.7
0%
Низкий
около 5 лет назад
redhat логотип
CVE-2020-8566

In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager's logs during provisioning of Ceph RBD persistent claims. This affects < v1.19.3, < v1.18.10, < v1.17.13.

CVSS3: 5.3
0%
Низкий
около 5 лет назад
nvd логотип
CVE-2020-8566

In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager's logs during provisioning of Ceph RBD persistent claims. This affects < v1.19.3, < v1.18.10, < v1.17.13.

CVSS3: 4.7
0%
Низкий
около 5 лет назад
debian логотип
CVE-2020-8566

In Kubernetes clusters using Ceph RBD as a storage provisioner, with l ...

CVSS3: 4.7
0%
Низкий
около 5 лет назад
ubuntu логотип
CVE-2020-8565

In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects <= v1.19.3, <= v1.18.10, <= v1.17.13, < v1.20.0-alpha2.

CVSS3: 4.7
0%
Низкий
около 5 лет назад
redhat логотип
CVE-2020-8565

In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects <= v1.19.3, <= v1.18.10, <= v1.17.13, < v1.20.0-alpha2.

CVSS3: 5.3
0%
Низкий
около 5 лет назад
nvd логотип
CVE-2020-8565

In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects <= v1.19.3, <= v1.18.10, <= v1.17.13, < v1.20.0-alpha2.

CVSS3: 4.7
0%
Низкий
около 5 лет назад

Уязвимостей на страницу