Логотип exploitDog
product: "kubernetes"
Консоль
Логотип exploitDog

exploitDog

product: "kubernetes"

Количество 318

Количество 318

nvd логотип

CVE-2019-11243

около 6 лет назад

In Kubernetes v1.12.0-v1.12.4 and v1.13.0, the rest.AnonymousClientConfig() method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data). In the affected versions, rest.AnonymousClientConfig() did not effectively clear service account credentials loaded using rest.InClusterConfig()

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2019-11243

около 6 лет назад

In Kubernetes v1.12.0-v1.12.4 and v1.13.0, the rest.AnonymousClientCon ...

CVSS3: 8.1
EPSS: Низкий
ubuntu логотип

CVE-2019-1002101

около 6 лет назад

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0.

CVSS3: 6.4
EPSS: Средний
redhat логотип

CVE-2019-1002101

около 6 лет назад

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0.

CVSS3: 5.3
EPSS: Средний
nvd логотип

CVE-2019-1002101

около 6 лет назад

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0.

CVSS3: 6.4
EPSS: Средний
debian логотип

CVE-2019-1002101

около 6 лет назад

The kubectl cp command allows copying files between containers and the ...

CVSS3: 6.4
EPSS: Средний
ubuntu логотип

CVE-2019-1002100

около 6 лет назад

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.

CVSS3: 6.5
EPSS: Средний
redhat логотип

CVE-2019-1002100

больше 6 лет назад

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.

CVSS3: 6.5
EPSS: Средний
nvd логотип

CVE-2019-1002100

около 6 лет назад

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.

CVSS3: 6.5
EPSS: Средний
debian логотип

CVE-2019-1002100

около 6 лет назад

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, use ...

CVSS3: 6.5
EPSS: Средний
ubuntu логотип

CVE-2016-7075

почти 7 лет назад

It was found that Kubernetes as used by Openshift Enterprise 3 did not correctly validate X.509 client intermediate certificate host name fields. An attacker could use this flaw to bypass authentication requirements by using a specially crafted X.509 certificate.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2016-7075

больше 8 лет назад

It was found that Kubernetes as used by Openshift Enterprise 3 did not correctly validate X.509 client intermediate certificate host name fields. An attacker could use this flaw to bypass authentication requirements by using a specially crafted X.509 certificate.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2016-7075

почти 7 лет назад

It was found that Kubernetes as used by Openshift Enterprise 3 did not correctly validate X.509 client intermediate certificate host name fields. An attacker could use this flaw to bypass authentication requirements by using a specially crafted X.509 certificate.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2016-7075

почти 7 лет назад

It was found that Kubernetes as used by Openshift Enterprise 3 did not ...

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2015-7561

больше 9 лет назад

Kubernetes in OpenShift3 allows remote authenticated users to use the private images of other users should they know the name of said image.

CVSS2: 3.5
EPSS: Низкий
nvd логотип

CVE-2015-7561

почти 8 лет назад

Kubernetes in OpenShift3 allows remote authenticated users to use the private images of other users should they know the name of said image.

CVSS3: 3.1
EPSS: Низкий
redhat логотип

CVE-2015-7528

больше 9 лет назад

Kubernetes before 1.2.0-alpha.5 allows remote attackers to read arbitrary pod logs via a container name.

CVSS2: 4
EPSS: Низкий
nvd логотип

CVE-2015-7528

около 9 лет назад

Kubernetes before 1.2.0-alpha.5 allows remote attackers to read arbitrary pod logs via a container name.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2015-7528

около 9 лет назад

Kubernetes before 1.2.0-alpha.5 allows remote attackers to read arbitr ...

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2024-10035

7 месяцев назад

Уязвимость программного средства управления кластерами виртуальных машин Kubernetes, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая выполнить произвольный код

CVSS3: 8.1
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-11243

In Kubernetes v1.12.0-v1.12.4 and v1.13.0, the rest.AnonymousClientConfig() method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data). In the affected versions, rest.AnonymousClientConfig() did not effectively clear service account credentials loaded using rest.InClusterConfig()

CVSS3: 8.1
0%
Низкий
около 6 лет назад
debian логотип
CVE-2019-11243

In Kubernetes v1.12.0-v1.12.4 and v1.13.0, the rest.AnonymousClientCon ...

CVSS3: 8.1
0%
Низкий
около 6 лет назад
ubuntu логотип
CVE-2019-1002101

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0.

CVSS3: 6.4
49%
Средний
около 6 лет назад
redhat логотип
CVE-2019-1002101

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0.

CVSS3: 5.3
49%
Средний
около 6 лет назад
nvd логотип
CVE-2019-1002101

The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0.

CVSS3: 6.4
49%
Средний
около 6 лет назад
debian логотип
CVE-2019-1002101

The kubectl cp command allows copying files between containers and the ...

CVSS3: 6.4
49%
Средний
около 6 лет назад
ubuntu логотип
CVE-2019-1002100

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.

CVSS3: 6.5
11%
Средний
около 6 лет назад
redhat логотип
CVE-2019-1002100

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.

CVSS3: 6.5
11%
Средний
больше 6 лет назад
nvd логотип
CVE-2019-1002100

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.

CVSS3: 6.5
11%
Средний
около 6 лет назад
debian логотип
CVE-2019-1002100

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, use ...

CVSS3: 6.5
11%
Средний
около 6 лет назад
ubuntu логотип
CVE-2016-7075

It was found that Kubernetes as used by Openshift Enterprise 3 did not correctly validate X.509 client intermediate certificate host name fields. An attacker could use this flaw to bypass authentication requirements by using a specially crafted X.509 certificate.

CVSS3: 7.5
0%
Низкий
почти 7 лет назад
redhat логотип
CVE-2016-7075

It was found that Kubernetes as used by Openshift Enterprise 3 did not correctly validate X.509 client intermediate certificate host name fields. An attacker could use this flaw to bypass authentication requirements by using a specially crafted X.509 certificate.

CVSS3: 7.5
0%
Низкий
больше 8 лет назад
nvd логотип
CVE-2016-7075

It was found that Kubernetes as used by Openshift Enterprise 3 did not correctly validate X.509 client intermediate certificate host name fields. An attacker could use this flaw to bypass authentication requirements by using a specially crafted X.509 certificate.

CVSS3: 7.5
0%
Низкий
почти 7 лет назад
debian логотип
CVE-2016-7075

It was found that Kubernetes as used by Openshift Enterprise 3 did not ...

CVSS3: 7.5
0%
Низкий
почти 7 лет назад
redhat логотип
CVE-2015-7561

Kubernetes in OpenShift3 allows remote authenticated users to use the private images of other users should they know the name of said image.

CVSS2: 3.5
0%
Низкий
больше 9 лет назад
nvd логотип
CVE-2015-7561

Kubernetes in OpenShift3 allows remote authenticated users to use the private images of other users should they know the name of said image.

CVSS3: 3.1
0%
Низкий
почти 8 лет назад
redhat логотип
CVE-2015-7528

Kubernetes before 1.2.0-alpha.5 allows remote attackers to read arbitrary pod logs via a container name.

CVSS2: 4
0%
Низкий
больше 9 лет назад
nvd логотип
CVE-2015-7528

Kubernetes before 1.2.0-alpha.5 allows remote attackers to read arbitrary pod logs via a container name.

CVSS3: 5.3
0%
Низкий
около 9 лет назад
debian логотип
CVE-2015-7528

Kubernetes before 1.2.0-alpha.5 allows remote attackers to read arbitr ...

CVSS3: 5.3
0%
Низкий
около 9 лет назад
fstec логотип
BDU:2024-10035

Уязвимость программного средства управления кластерами виртуальных машин Kubernetes, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая выполнить произвольный код

CVSS3: 8.1
11%
Средний
7 месяцев назад

Уязвимостей на страницу