Логотип exploitDog
product: "kubernetes"
Консоль
Логотип exploitDog

exploitDog

product: "kubernetes"

Количество 318

Количество 318

ubuntu логотип

CVE-2018-1002100

около 7 лет назад

In Kubernetes versions 1.5.x, 1.6.x, 1.7.x, 1.8.x, and prior to version 1.9.6, the kubectl cp command insecurely handles tar data returned from the container, and can be caused to overwrite arbitrary local files.

CVSS3: 4.2
EPSS: Низкий
redhat логотип

CVE-2018-1002100

больше 7 лет назад

In Kubernetes versions 1.5.x, 1.6.x, 1.7.x, 1.8.x, and prior to version 1.9.6, the kubectl cp command insecurely handles tar data returned from the container, and can be caused to overwrite arbitrary local files.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2018-1002100

около 7 лет назад

In Kubernetes versions 1.5.x, 1.6.x, 1.7.x, 1.8.x, and prior to version 1.9.6, the kubectl cp command insecurely handles tar data returned from the container, and can be caused to overwrite arbitrary local files.

CVSS3: 4.2
EPSS: Низкий
debian логотип

CVE-2018-1002100

около 7 лет назад

In Kubernetes versions 1.5.x, 1.6.x, 1.7.x, 1.8.x, and prior to versio ...

CVSS3: 4.2
EPSS: Низкий
redhat логотип

CVE-2018-1000187

около 7 лет назад

A exposure of sensitive information vulnerability exists in Jenkins Kubernetes Plugin 1.7.0 and older in ContainerExecDecorator.java that results in sensitive variables such as passwords being written to logs.

CVSS3: 3.1
EPSS: Низкий
nvd логотип

CVE-2018-1000187

около 7 лет назад

A exposure of sensitive information vulnerability exists in Jenkins Kubernetes Plugin 1.7.0 and older in ContainerExecDecorator.java that results in sensitive variables such as passwords being written to logs.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2017-1002102

больше 7 лет назад

In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using a secret, configMap, projected or downwardAPI volume can trigger deletion of arbitrary files/directories from the nodes where they are running.

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2017-1002102

больше 7 лет назад

In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using a secret, configMap, projected or downwardAPI volume can trigger deletion of arbitrary files/directories from the nodes where they are running.

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2017-1002102

больше 7 лет назад

In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to version ...

CVSS3: 7.1
EPSS: Низкий
redhat логотип

CVE-2017-1002101

больше 7 лет назад

In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host's filesystem.

CVSS3: 7.2
EPSS: Средний
nvd логотип

CVE-2017-1002101

больше 7 лет назад

In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host's filesystem.

CVSS3: 8.8
EPSS: Средний
debian логотип

CVE-2017-1002101

больше 7 лет назад

In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to version ...

CVSS3: 8.8
EPSS: Средний
redhat логотип

CVE-2017-1002100

около 8 лет назад

Default access permissions for Persistent Volumes (PVs) created by the Kubernetes Azure cloud provider in versions 1.6.0 to 1.6.5 are set to "container" which exposes a URI that can be accessed without authentication on the public internet. Access to the URI string requires privileged access to the Kubernetes cluster or authenticated access to the Azure portal.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2017-1002100

почти 8 лет назад

Default access permissions for Persistent Volumes (PVs) created by the Kubernetes Azure cloud provider in versions 1.6.0 to 1.6.5 are set to "container" which exposes a URI that can be accessed without authentication on the public internet. Access to the URI string requires privileged access to the Kubernetes cluster or authenticated access to the Azure portal.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2017-1002100

почти 8 лет назад

Default access permissions for Persistent Volumes (PVs) created by the ...

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2017-1000056

почти 8 лет назад

Kubernetes version 1.5.0-1.5.4 is vulnerable to a privilege escalation in the PodSecurityPolicy admission plugin resulting in the ability to make use of any existing PodSecurityPolicy object.

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2017-1000056

больше 8 лет назад

Kubernetes version 1.5.0-1.5.4 is vulnerable to a privilege escalation in the PodSecurityPolicy admission plugin resulting in the ability to make use of any existing PodSecurityPolicy object.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2017-1000056

почти 8 лет назад

Kubernetes version 1.5.0-1.5.4 is vulnerable to a privilege escalation in the PodSecurityPolicy admission plugin resulting in the ability to make use of any existing PodSecurityPolicy object.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2017-1000056

почти 8 лет назад

Kubernetes version 1.5.0-1.5.4 is vulnerable to a privilege escalation ...

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2016-1906

больше 9 лет назад

Openshift allows remote attackers to gain privileges by updating a build configuration that was created with an allowed type to a type that is not allowed.

CVSS2: 4.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-1002100

In Kubernetes versions 1.5.x, 1.6.x, 1.7.x, 1.8.x, and prior to version 1.9.6, the kubectl cp command insecurely handles tar data returned from the container, and can be caused to overwrite arbitrary local files.

CVSS3: 4.2
1%
Низкий
около 7 лет назад
redhat логотип
CVE-2018-1002100

In Kubernetes versions 1.5.x, 1.6.x, 1.7.x, 1.8.x, and prior to version 1.9.6, the kubectl cp command insecurely handles tar data returned from the container, and can be caused to overwrite arbitrary local files.

CVSS3: 6.1
1%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-1002100

In Kubernetes versions 1.5.x, 1.6.x, 1.7.x, 1.8.x, and prior to version 1.9.6, the kubectl cp command insecurely handles tar data returned from the container, and can be caused to overwrite arbitrary local files.

CVSS3: 4.2
1%
Низкий
около 7 лет назад
debian логотип
CVE-2018-1002100

In Kubernetes versions 1.5.x, 1.6.x, 1.7.x, 1.8.x, and prior to versio ...

CVSS3: 4.2
1%
Низкий
около 7 лет назад
redhat логотип
CVE-2018-1000187

A exposure of sensitive information vulnerability exists in Jenkins Kubernetes Plugin 1.7.0 and older in ContainerExecDecorator.java that results in sensitive variables such as passwords being written to logs.

CVSS3: 3.1
0%
Низкий
около 7 лет назад
nvd логотип
CVE-2018-1000187

A exposure of sensitive information vulnerability exists in Jenkins Kubernetes Plugin 1.7.0 and older in ContainerExecDecorator.java that results in sensitive variables such as passwords being written to logs.

CVSS3: 6.5
0%
Низкий
около 7 лет назад
redhat логотип
CVE-2017-1002102

In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using a secret, configMap, projected or downwardAPI volume can trigger deletion of arbitrary files/directories from the nodes where they are running.

CVSS3: 7.1
0%
Низкий
больше 7 лет назад
nvd логотип
CVE-2017-1002102

In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using a secret, configMap, projected or downwardAPI volume can trigger deletion of arbitrary files/directories from the nodes where they are running.

CVSS3: 7.1
0%
Низкий
больше 7 лет назад
debian логотип
CVE-2017-1002102

In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to version ...

CVSS3: 7.1
0%
Низкий
больше 7 лет назад
redhat логотип
CVE-2017-1002101

In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host's filesystem.

CVSS3: 7.2
33%
Средний
больше 7 лет назад
nvd логотип
CVE-2017-1002101

In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host's filesystem.

CVSS3: 8.8
33%
Средний
больше 7 лет назад
debian логотип
CVE-2017-1002101

In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to version ...

CVSS3: 8.8
33%
Средний
больше 7 лет назад
redhat логотип
CVE-2017-1002100

Default access permissions for Persistent Volumes (PVs) created by the Kubernetes Azure cloud provider in versions 1.6.0 to 1.6.5 are set to "container" which exposes a URI that can be accessed without authentication on the public internet. Access to the URI string requires privileged access to the Kubernetes cluster or authenticated access to the Azure portal.

CVSS3: 6.5
0%
Низкий
около 8 лет назад
nvd логотип
CVE-2017-1002100

Default access permissions for Persistent Volumes (PVs) created by the Kubernetes Azure cloud provider in versions 1.6.0 to 1.6.5 are set to "container" which exposes a URI that can be accessed without authentication on the public internet. Access to the URI string requires privileged access to the Kubernetes cluster or authenticated access to the Azure portal.

CVSS3: 6.5
0%
Низкий
почти 8 лет назад
debian логотип
CVE-2017-1002100

Default access permissions for Persistent Volumes (PVs) created by the ...

CVSS3: 6.5
0%
Низкий
почти 8 лет назад
ubuntu логотип
CVE-2017-1000056

Kubernetes version 1.5.0-1.5.4 is vulnerable to a privilege escalation in the PodSecurityPolicy admission plugin resulting in the ability to make use of any existing PodSecurityPolicy object.

CVSS3: 9.8
0%
Низкий
почти 8 лет назад
redhat логотип
CVE-2017-1000056

Kubernetes version 1.5.0-1.5.4 is vulnerable to a privilege escalation in the PodSecurityPolicy admission plugin resulting in the ability to make use of any existing PodSecurityPolicy object.

CVSS3: 7.5
0%
Низкий
больше 8 лет назад
nvd логотип
CVE-2017-1000056

Kubernetes version 1.5.0-1.5.4 is vulnerable to a privilege escalation in the PodSecurityPolicy admission plugin resulting in the ability to make use of any existing PodSecurityPolicy object.

CVSS3: 9.8
0%
Низкий
почти 8 лет назад
debian логотип
CVE-2017-1000056

Kubernetes version 1.5.0-1.5.4 is vulnerable to a privilege escalation ...

CVSS3: 9.8
0%
Низкий
почти 8 лет назад
redhat логотип
CVE-2016-1906

Openshift allows remote attackers to gain privileges by updating a build configuration that was created with an allowed type to a type that is not allowed.

CVSS2: 4.6
2%
Низкий
больше 9 лет назад

Уязвимостей на страницу