Логотип exploitDog
bind:CVE-2019-11247
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-11247

Количество 6

Количество 6

ubuntu логотип

CVE-2019-11247

почти 6 лет назад

The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.

CVSS3: 8.1
EPSS: Низкий
redhat логотип

CVE-2019-11247

почти 6 лет назад

The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.

CVSS3: 5
EPSS: Низкий
nvd логотип

CVE-2019-11247

почти 6 лет назад

The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2019-11247

почти 6 лет назад

The Kubernetes kube-apiserver mistakenly allows access to a cluster-sc ...

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-fp37-c92q-4pwq

около 3 лет назад

Kubernetes kube-apiserver unauthorized access

CVSS3: 8.1
EPSS: Низкий
oracle-oval логотип

ELSA-2019-4816

больше 5 лет назад

ELSA-2019-4816: kubernetes security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-11247

The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.

CVSS3: 8.1
0%
Низкий
почти 6 лет назад
redhat логотип
CVE-2019-11247

The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.

CVSS3: 5
0%
Низкий
почти 6 лет назад
nvd логотип
CVE-2019-11247

The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.

CVSS3: 8.1
0%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-11247

The Kubernetes kube-apiserver mistakenly allows access to a cluster-sc ...

CVSS3: 8.1
0%
Низкий
почти 6 лет назад
github логотип
GHSA-fp37-c92q-4pwq

Kubernetes kube-apiserver unauthorized access

CVSS3: 8.1
0%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2019-4816

ELSA-2019-4816: kubernetes security update (IMPORTANT)

больше 5 лет назад

Уязвимостей на страницу