Логотип exploitDog
bind:CVE-2021-20206
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-20206

Количество 17

Количество 17

ubuntu логотип

CVE-2021-20206

почти 5 лет назад

An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 7.2
EPSS: Низкий
redhat логотип

CVE-2021-20206

около 5 лет назад

An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 7.2
EPSS: Низкий
nvd логотип

CVE-2021-20206

почти 5 лет назад

An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 7.2
EPSS: Низкий
debian логотип

CVE-2021-20206

почти 5 лет назад

An improper limitation of path name flaw was found in containernetwork ...

CVSS3: 7.2
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4593-1

около 3 лет назад

Security update for cni-plugins

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4592-1

около 3 лет назад

Security update for cni

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4150-1

около 3 лет назад

Security update for cni

EPSS: Низкий
github логотип

GHSA-xjqr-g762-pxwp

почти 4 года назад

containernetworking/cni improper limitation of path name

CVSS3: 7.2
EPSS: Низкий
fstec логотип

BDU:2023-05301

около 5 лет назад

Уязвимость интерфейса для подключения сетевых плагинов к контейнерным оркестраторам Container Network Interface (CNI), позволяющая нарушителю оказать влияние на целостность, доступность и конфиденциальность защищаемой информации

CVSS3: 7.2
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4151-1

около 3 лет назад

Security update for cni-plugins

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2022:0770-1

почти 4 года назад

Security update for buildah

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3766-1

больше 3 лет назад

Security update for buildah

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3655-1

больше 3 лет назад

Security update for buildah

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3480-1

больше 3 лет назад

Security update for buildah

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0770-1

почти 4 года назад

Security update for buildah

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0326-1

почти 3 года назад

Security update for podman

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0187-1

около 3 лет назад

Security update for podman

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-20206

An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 7.2
0%
Низкий
почти 5 лет назад
redhat логотип
CVE-2021-20206

An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 7.2
0%
Низкий
около 5 лет назад
nvd логотип
CVE-2021-20206

An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 7.2
0%
Низкий
почти 5 лет назад
debian логотип
CVE-2021-20206

An improper limitation of path name flaw was found in containernetwork ...

CVSS3: 7.2
0%
Низкий
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2022:4593-1

Security update for cni-plugins

0%
Низкий
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:4592-1

Security update for cni

0%
Низкий
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:4150-1

Security update for cni

0%
Низкий
около 3 лет назад
github логотип
GHSA-xjqr-g762-pxwp

containernetworking/cni improper limitation of path name

CVSS3: 7.2
0%
Низкий
почти 4 года назад
fstec логотип
BDU:2023-05301

Уязвимость интерфейса для подключения сетевых плагинов к контейнерным оркестраторам Container Network Interface (CNI), позволяющая нарушителю оказать влияние на целостность, доступность и конфиденциальность защищаемой информации

CVSS3: 7.2
0%
Низкий
около 5 лет назад
suse-cvrf логотип
SUSE-SU-2022:4151-1

Security update for cni-plugins

около 3 лет назад
suse-cvrf логотип
openSUSE-SU-2022:0770-1

Security update for buildah

почти 4 года назад
suse-cvrf логотип
SUSE-SU-2022:3766-1

Security update for buildah

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:3655-1

Security update for buildah

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:3480-1

Security update for buildah

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:0770-1

Security update for buildah

почти 4 года назад
suse-cvrf логотип
SUSE-SU-2023:0326-1

Security update for podman

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:0187-1

Security update for podman

около 3 лет назад

Уязвимостей на страницу