Логотип exploitDog
product: "kubernetes"
Консоль
Логотип exploitDog

exploitDog

product: "kubernetes"

Количество 326

Количество 326

github логотип

GHSA-jmrx-5g74-6v2f

больше 3 лет назад

Kubernetes client-go library logs may disclose credentials to unauthorized users

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-gc6w-4mgp-mgjm

около 2 месяцев назад

A SQL Injection vulnerability exists in Esri ArcGIS Server versions 11.3, 11.4 and 11.5 on Windows, Linux and Kubernetes. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary SQL commands via a specific ArcGIS Feature Service operation. Successful exploitation can potentially result in unauthorized access, modification, or deletion of data from the underlying Enterprise Geodatabase.

CVSS3: 10
EPSS: Низкий
github логотип

GHSA-gc2p-g4fg-29vh

больше 3 лет назад

Kubernetes did not effectively clear service account credentials

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-fp37-c92q-4pwq

больше 3 лет назад

Kubernetes kube-apiserver unauthorized access

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-7w66-j2r2-vm3p

больше 3 лет назад

It was found that Kubernetes as used by Openshift Enterprise 3 did not correctly validate X.509 client intermediate certificate host name fields. An attacker could use this flaw to bypass authentication requirements by using a specially crafted X.509 certificate.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-34jx-wx69-9x8v

почти 4 года назад

Symlink Attack in kubectl cp

CVSS3: 5.5
EPSS: Средний
github логотип

GHSA-2h9c-34v6-3qmr

больше 3 лет назад

Kubernetes in OpenShift3 Access Control Misconfiguration

CVSS3: 3.1
EPSS: Низкий
nvd логотип

CVE-2025-57870

около 2 месяцев назад

A SQL Injection vulnerability exists in Esri ArcGIS Server versions 11.3, 11.4 and 11.5 on Windows, Linux and Kubernetes. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary SQL commands via a specific ArcGIS Feature Service operation. Successful exploitation can potentially result in unauthorized access, modification, or deletion of data from the underlying Enterprise Geodatabase.

CVSS3: 10
EPSS: Низкий
ubuntu логотип

CVE-2019-11253

около 6 лет назад

Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming unavailable. Prior to v1.14.0, default RBAC policy authorized anonymous users to submit requests that could trigger this vulnerability. Clusters upgraded from a version prior to v1.14.0 keep the more permissive policy by default for backwards compatibility.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2019-11253

около 6 лет назад

Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming unavailable. Prior to v1.14.0, default RBAC policy authorized anonymous users to submit requests that could trigger this vulnerability. Clusters upgraded from a version prior to v1.14.0 keep the more permissive policy by default for backwards compatibility.

CVSS3: 7.5
EPSS: Средний
nvd логотип

CVE-2019-11253

около 6 лет назад

Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming unavailable. Prior to v1.14.0, default RBAC policy authorized anonymous users to submit requests that could trigger this vulnerability. Clusters upgraded from a version prior to v1.14.0 keep the more permissive policy by default for backwards compatibility.

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2019-11253

около 6 лет назад

Improper input validation in the Kubernetes API server in versions v1. ...

CVSS3: 7.5
EPSS: Средний
ubuntu логотип

CVE-2019-11250

больше 6 лет назад

The Kubernetes client-go library logs request headers at verbosity levels of 7 or higher. This can disclose credentials to unauthorized users via logs or command output. Kubernetes components (such as kube-apiserver) prior to v1.16.0, which make use of basic or bearer token authentication, and run at high verbosity levels, are affected.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2019-11250

больше 6 лет назад

The Kubernetes client-go library logs request headers at verbosity levels of 7 or higher. This can disclose credentials to unauthorized users via logs or command output. Kubernetes components (such as kube-apiserver) prior to v1.16.0, which make use of basic or bearer token authentication, and run at high verbosity levels, are affected.

CVSS3: 4.4
EPSS: Низкий
nvd логотип

CVE-2019-11250

больше 6 лет назад

The Kubernetes client-go library logs request headers at verbosity levels of 7 or higher. This can disclose credentials to unauthorized users via logs or command output. Kubernetes components (such as kube-apiserver) prior to v1.16.0, which make use of basic or bearer token authentication, and run at high verbosity levels, are affected.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2019-11250

больше 6 лет назад

The Kubernetes client-go library logs request headers at verbosity lev ...

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2019-11249

больше 6 лет назад

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.1, 1.2, 1.4, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2019-11249

больше 6 лет назад

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.1, 1.2, 1.4, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.

CVSS3: 4.8
EPSS: Низкий
nvd логотип

CVE-2019-11249

больше 6 лет назад

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.1, 1.2, 1.4, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2019-11249

больше 6 лет назад

The kubectl cp command allows copying files between containers and the ...

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-jmrx-5g74-6v2f

Kubernetes client-go library logs may disclose credentials to unauthorized users

CVSS3: 6.5
1%
Низкий
больше 3 лет назад
github логотип
GHSA-gc6w-4mgp-mgjm

A SQL Injection vulnerability exists in Esri ArcGIS Server versions 11.3, 11.4 and 11.5 on Windows, Linux and Kubernetes. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary SQL commands via a specific ArcGIS Feature Service operation. Successful exploitation can potentially result in unauthorized access, modification, or deletion of data from the underlying Enterprise Geodatabase.

CVSS3: 10
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-gc2p-g4fg-29vh

Kubernetes did not effectively clear service account credentials

CVSS3: 8.1
0%
Низкий
больше 3 лет назад
github логотип
GHSA-fp37-c92q-4pwq

Kubernetes kube-apiserver unauthorized access

CVSS3: 8.1
1%
Низкий
больше 3 лет назад
github логотип
GHSA-7w66-j2r2-vm3p

It was found that Kubernetes as used by Openshift Enterprise 3 did not correctly validate X.509 client intermediate certificate host name fields. An attacker could use this flaw to bypass authentication requirements by using a specially crafted X.509 certificate.

CVSS3: 8.1
0%
Низкий
больше 3 лет назад
github логотип
GHSA-34jx-wx69-9x8v

Symlink Attack in kubectl cp

CVSS3: 5.5
49%
Средний
почти 4 года назад
github логотип
GHSA-2h9c-34v6-3qmr

Kubernetes in OpenShift3 Access Control Misconfiguration

CVSS3: 3.1
0%
Низкий
больше 3 лет назад
nvd логотип
CVE-2025-57870

A SQL Injection vulnerability exists in Esri ArcGIS Server versions 11.3, 11.4 and 11.5 on Windows, Linux and Kubernetes. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary SQL commands via a specific ArcGIS Feature Service operation. Successful exploitation can potentially result in unauthorized access, modification, or deletion of data from the underlying Enterprise Geodatabase.

CVSS3: 10
0%
Низкий
около 2 месяцев назад
ubuntu логотип
CVE-2019-11253

Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming unavailable. Prior to v1.14.0, default RBAC policy authorized anonymous users to submit requests that could trigger this vulnerability. Clusters upgraded from a version prior to v1.14.0 keep the more permissive policy by default for backwards compatibility.

CVSS3: 7.5
39%
Средний
около 6 лет назад
redhat логотип
CVE-2019-11253

Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming unavailable. Prior to v1.14.0, default RBAC policy authorized anonymous users to submit requests that could trigger this vulnerability. Clusters upgraded from a version prior to v1.14.0 keep the more permissive policy by default for backwards compatibility.

CVSS3: 7.5
39%
Средний
около 6 лет назад
nvd логотип
CVE-2019-11253

Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming unavailable. Prior to v1.14.0, default RBAC policy authorized anonymous users to submit requests that could trigger this vulnerability. Clusters upgraded from a version prior to v1.14.0 keep the more permissive policy by default for backwards compatibility.

CVSS3: 7.5
39%
Средний
около 6 лет назад
debian логотип
CVE-2019-11253

Improper input validation in the Kubernetes API server in versions v1. ...

CVSS3: 7.5
39%
Средний
около 6 лет назад
ubuntu логотип
CVE-2019-11250

The Kubernetes client-go library logs request headers at verbosity levels of 7 or higher. This can disclose credentials to unauthorized users via logs or command output. Kubernetes components (such as kube-apiserver) prior to v1.16.0, which make use of basic or bearer token authentication, and run at high verbosity levels, are affected.

CVSS3: 6.5
1%
Низкий
больше 6 лет назад
redhat логотип
CVE-2019-11250

The Kubernetes client-go library logs request headers at verbosity levels of 7 or higher. This can disclose credentials to unauthorized users via logs or command output. Kubernetes components (such as kube-apiserver) prior to v1.16.0, which make use of basic or bearer token authentication, and run at high verbosity levels, are affected.

CVSS3: 4.4
1%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-11250

The Kubernetes client-go library logs request headers at verbosity levels of 7 or higher. This can disclose credentials to unauthorized users via logs or command output. Kubernetes components (such as kube-apiserver) prior to v1.16.0, which make use of basic or bearer token authentication, and run at high verbosity levels, are affected.

CVSS3: 6.5
1%
Низкий
больше 6 лет назад
debian логотип
CVE-2019-11250

The Kubernetes client-go library logs request headers at verbosity lev ...

CVSS3: 6.5
1%
Низкий
больше 6 лет назад
ubuntu логотип
CVE-2019-11249

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.1, 1.2, 1.4, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.

CVSS3: 6.5
4%
Низкий
больше 6 лет назад
redhat логотип
CVE-2019-11249

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.1, 1.2, 1.4, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.

CVSS3: 4.8
4%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-11249

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.1, 1.2, 1.4, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.

CVSS3: 6.5
4%
Низкий
больше 6 лет назад
debian логотип
CVE-2019-11249

The kubectl cp command allows copying files between containers and the ...

CVSS3: 6.5
4%
Низкий
больше 6 лет назад

Уязвимостей на страницу