Количество 7
Количество 7
CVE-2019-5021
Versions of the Official Alpine Linux Docker images (since v3.3) contain a NULL password for the `root` user. This vulnerability appears to be the result of a regression introduced in December of 2015. Due to the nature of this issue, systems deployed using affected versions of the Alpine Linux container which utilize Linux PAM, or some other mechanism which uses the system shadow file as an authentication database, may accept a NULL password for the `root` user.
openSUSE-SU-2019:1495-1
Recommended update for sles12sp3-docker-image, sles12sp4-image, system-user-root
SUSE-SU-2021:4011-1
Security update for sles12sp2-docker-image
SUSE-SU-2019:1368-2
Recommended update for sles12sp3-docker-image, sles12sp4-image, system-user-root
SUSE-SU-2019:1368-1
Recommended update for sles12sp3-docker-image, sles12sp4-image, system-user-root
GHSA-m3hq-qcc9-75f6
Versions of the Official Alpine Linux Docker images (since v3.3) contain a NULL password for the `root` user. This vulnerability appears to be the result of a regression introduced in December of 2015. Due to the nature of this issue, systems deployed using affected versions of the Alpine Linux container which utilize Linux PAM, or some other mechanism which uses the system shadow file as an authentication database, may accept a NULL password for the `root` user.
BDU:2019-02387
Уязвимость образа Linux-дистрибутива Alpine Linux Docker, связанная с использованием пустого пароля для предустановленной учетной записи, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2019-5021 Versions of the Official Alpine Linux Docker images (since v3.3) contain a NULL password for the `root` user. This vulnerability appears to be the result of a regression introduced in December of 2015. Due to the nature of this issue, systems deployed using affected versions of the Alpine Linux container which utilize Linux PAM, or some other mechanism which uses the system shadow file as an authentication database, may accept a NULL password for the `root` user. | CVSS3: 9.8 | 4% Низкий | почти 7 лет назад | |
openSUSE-SU-2019:1495-1 Recommended update for sles12sp3-docker-image, sles12sp4-image, system-user-root | 4% Низкий | больше 6 лет назад | ||
SUSE-SU-2021:4011-1 Security update for sles12sp2-docker-image | 4% Низкий | около 4 лет назад | ||
SUSE-SU-2019:1368-2 Recommended update for sles12sp3-docker-image, sles12sp4-image, system-user-root | 4% Низкий | больше 6 лет назад | ||
SUSE-SU-2019:1368-1 Recommended update for sles12sp3-docker-image, sles12sp4-image, system-user-root | 4% Низкий | больше 6 лет назад | ||
GHSA-m3hq-qcc9-75f6 Versions of the Official Alpine Linux Docker images (since v3.3) contain a NULL password for the `root` user. This vulnerability appears to be the result of a regression introduced in December of 2015. Due to the nature of this issue, systems deployed using affected versions of the Alpine Linux container which utilize Linux PAM, or some other mechanism which uses the system shadow file as an authentication database, may accept a NULL password for the `root` user. | CVSS3: 9.8 | 4% Низкий | больше 3 лет назад | |
BDU:2019-02387 Уязвимость образа Linux-дистрибутива Alpine Linux Docker, связанная с использованием пустого пароля для предустановленной учетной записи, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 9.8 | 4% Низкий | почти 7 лет назад |
Уязвимостей на страницу