Логотип exploitDog
product: "kubernetes"
Консоль
Логотип exploitDog

exploitDog

product: "kubernetes"

Количество 318

Количество 318

debian логотип

CVE-2020-8551

около 5 лет назад

The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1. ...

CVSS3: 4.3
EPSS: Низкий
redhat логотип

CVE-2020-2309

больше 4 лет назад

A missing/An incorrect permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2020-2309

больше 4 лет назад

A missing/An incorrect permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVSS3: 4.3
EPSS: Низкий
redhat логотип

CVE-2020-2308

больше 4 лет назад

A missing permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to list global pod template names.

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2020-2308

больше 4 лет назад

A missing permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to list global pod template names.

CVSS3: 4.3
EPSS: Низкий
redhat логотип

CVE-2020-2307

больше 4 лет назад

Jenkins Kubernetes Plugin 1.27.3 and earlier allows low-privilege users to access possibly sensitive Jenkins controller environment variables.

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2020-2307

больше 4 лет назад

Jenkins Kubernetes Plugin 1.27.3 and earlier allows low-privilege users to access possibly sensitive Jenkins controller environment variables.

CVSS3: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2019-11254

около 5 лет назад

The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2019-11254

около 5 лет назад

The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2019-11254

около 5 лет назад

The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2019-11254

около 5 лет назад

The Kubernetes API Server component in versions 1.1-1.14, and versions ...

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2019-11252

почти 5 лет назад

The Kubernetes kube-controller-manager in versions v1.0-v1.17 is vulnerable to a credential leakage via error messages in mount failure logs and events for AzureFile and CephFS volumes.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2019-11252

больше 5 лет назад

The Kubernetes kube-controller-manager in versions v1.0-v1.17 is vulnerable to a credential leakage via error messages in mount failure logs and events for AzureFile and CephFS volumes.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2019-11252

почти 5 лет назад

The Kubernetes kube-controller-manager in versions v1.0-v1.17 is vulnerable to a credential leakage via error messages in mount failure logs and events for AzureFile and CephFS volumes.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2019-11252

почти 5 лет назад

The Kubernetes kube-controller-manager in versions v1.0-v1.17 is vulne ...

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2019-11251

больше 5 лет назад

The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree.

CVSS3: 4.8
EPSS: Низкий
redhat логотип

CVE-2019-11251

почти 6 лет назад

The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2019-11251

больше 5 лет назад

The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree.

CVSS3: 4.8
EPSS: Низкий
debian логотип

CVE-2019-11251

больше 5 лет назад

The Kubernetes kubectl cp command in versions 1.1-1.12, and versions p ...

CVSS3: 4.8
EPSS: Низкий
ubuntu логотип

CVE-2019-11248

почти 6 лет назад

The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. The go pprof endpoint is exposed over the Kubelet's healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration.

CVSS3: 8.2
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
debian логотип
CVE-2020-8551

The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1. ...

CVSS3: 4.3
0%
Низкий
около 5 лет назад
redhat логотип
CVE-2020-2309

A missing/An incorrect permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVSS3: 4.3
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2020-2309

A missing/An incorrect permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.

CVSS3: 4.3
0%
Низкий
больше 4 лет назад
redhat логотип
CVE-2020-2308

A missing permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to list global pod template names.

CVSS3: 4.3
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2020-2308

A missing permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to list global pod template names.

CVSS3: 4.3
0%
Низкий
больше 4 лет назад
redhat логотип
CVE-2020-2307

Jenkins Kubernetes Plugin 1.27.3 and earlier allows low-privilege users to access possibly sensitive Jenkins controller environment variables.

CVSS3: 4.3
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2020-2307

Jenkins Kubernetes Plugin 1.27.3 and earlier allows low-privilege users to access possibly sensitive Jenkins controller environment variables.

CVSS3: 4.3
0%
Низкий
больше 4 лет назад
ubuntu логотип
CVE-2019-11254

The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.

CVSS3: 6.5
0%
Низкий
около 5 лет назад
redhat логотип
CVE-2019-11254

The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.

CVSS3: 6.5
0%
Низкий
около 5 лет назад
nvd логотип
CVE-2019-11254

The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.

CVSS3: 6.5
0%
Низкий
около 5 лет назад
debian логотип
CVE-2019-11254

The Kubernetes API Server component in versions 1.1-1.14, and versions ...

CVSS3: 6.5
0%
Низкий
около 5 лет назад
ubuntu логотип
CVE-2019-11252

The Kubernetes kube-controller-manager in versions v1.0-v1.17 is vulnerable to a credential leakage via error messages in mount failure logs and events for AzureFile and CephFS volumes.

CVSS3: 5.9
0%
Низкий
почти 5 лет назад
redhat логотип
CVE-2019-11252

The Kubernetes kube-controller-manager in versions v1.0-v1.17 is vulnerable to a credential leakage via error messages in mount failure logs and events for AzureFile and CephFS volumes.

CVSS3: 5.9
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2019-11252

The Kubernetes kube-controller-manager in versions v1.0-v1.17 is vulnerable to a credential leakage via error messages in mount failure logs and events for AzureFile and CephFS volumes.

CVSS3: 5.9
0%
Низкий
почти 5 лет назад
debian логотип
CVE-2019-11252

The Kubernetes kube-controller-manager in versions v1.0-v1.17 is vulne ...

CVSS3: 5.9
0%
Низкий
почти 5 лет назад
ubuntu логотип
CVE-2019-11251

The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree.

CVSS3: 4.8
2%
Низкий
больше 5 лет назад
redhat логотип
CVE-2019-11251

The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree.

CVSS3: 5.3
2%
Низкий
почти 6 лет назад
nvd логотип
CVE-2019-11251

The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree.

CVSS3: 4.8
2%
Низкий
больше 5 лет назад
debian логотип
CVE-2019-11251

The Kubernetes kubectl cp command in versions 1.1-1.12, and versions p ...

CVSS3: 4.8
2%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2019-11248

The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. The go pprof endpoint is exposed over the Kubelet's healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration.

CVSS3: 8.2
91%
Критический
почти 6 лет назад

Уязвимостей на страницу