Логотип exploitDog
bind:CVE-2020-14316
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-14316

Количество 3

Количество 3

redhat логотип

CVE-2020-14316

больше 5 лет назад

A flaw was found in kubevirt 0.29 and earlier. Virtual Machine Instances (VMIs) can be used to gain access to the host's filesystem. Successful exploitation allows an attacker to assume the privileges of the VM process on the host system. In worst-case scenarios an attacker can read and modify any file on the system where the VMI is running. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 9.9
EPSS: Низкий
nvd логотип

CVE-2020-14316

больше 5 лет назад

A flaw was found in kubevirt 0.29 and earlier. Virtual Machine Instances (VMIs) can be used to gain access to the host's filesystem. Successful exploitation allows an attacker to assume the privileges of the VM process on the host system. In worst-case scenarios an attacker can read and modify any file on the system where the VMI is running. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 9.9
EPSS: Низкий
github логотип

GHSA-828r-r2c8-rfw3

почти 2 года назад

Privilege Escalation in kubevirt

CVSS3: 9.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2020-14316

A flaw was found in kubevirt 0.29 and earlier. Virtual Machine Instances (VMIs) can be used to gain access to the host's filesystem. Successful exploitation allows an attacker to assume the privileges of the VM process on the host system. In worst-case scenarios an attacker can read and modify any file on the system where the VMI is running. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 9.9
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-14316

A flaw was found in kubevirt 0.29 and earlier. Virtual Machine Instances (VMIs) can be used to gain access to the host's filesystem. Successful exploitation allows an attacker to assume the privileges of the VM process on the host system. In worst-case scenarios an attacker can read and modify any file on the system where the VMI is running. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 9.9
0%
Низкий
больше 5 лет назад
github логотип
GHSA-828r-r2c8-rfw3

Privilege Escalation in kubevirt

CVSS3: 9.9
0%
Низкий
почти 2 года назад

Уязвимостей на страницу