Количество 17
Количество 17
CVE-2021-20206
An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
CVE-2021-20206
An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
CVE-2021-20206
An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
CVE-2021-20206
An improper limitation of path name flaw was found in containernetwork ...
SUSE-SU-2022:4593-1
Security update for cni-plugins
SUSE-SU-2022:4592-1
Security update for cni
SUSE-SU-2022:4150-1
Security update for cni
GHSA-xjqr-g762-pxwp
containernetworking/cni improper limitation of path name
BDU:2023-05301
Уязвимость интерфейса для подключения сетевых плагинов к контейнерным оркестраторам Container Network Interface (CNI), позволяющая нарушителю оказать влияние на целостность, доступность и конфиденциальность защищаемой информации
SUSE-SU-2022:4151-1
Security update for cni-plugins
openSUSE-SU-2022:0770-1
Security update for buildah
SUSE-SU-2022:3766-1
Security update for buildah
SUSE-SU-2022:3655-1
Security update for buildah
SUSE-SU-2022:3480-1
Security update for buildah
SUSE-SU-2022:0770-1
Security update for buildah
SUSE-SU-2023:0326-1
Security update for podman
SUSE-SU-2023:0187-1
Security update for podman
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-20206 An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. | CVSS3: 7.2 | 0% Низкий | почти 5 лет назад | |
CVE-2021-20206 An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. | CVSS3: 7.2 | 0% Низкий | около 5 лет назад | |
CVE-2021-20206 An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. | CVSS3: 7.2 | 0% Низкий | почти 5 лет назад | |
CVE-2021-20206 An improper limitation of path name flaw was found in containernetwork ... | CVSS3: 7.2 | 0% Низкий | почти 5 лет назад | |
SUSE-SU-2022:4593-1 Security update for cni-plugins | 0% Низкий | около 3 лет назад | ||
SUSE-SU-2022:4592-1 Security update for cni | 0% Низкий | около 3 лет назад | ||
SUSE-SU-2022:4150-1 Security update for cni | 0% Низкий | около 3 лет назад | ||
GHSA-xjqr-g762-pxwp containernetworking/cni improper limitation of path name | CVSS3: 7.2 | 0% Низкий | почти 4 года назад | |
BDU:2023-05301 Уязвимость интерфейса для подключения сетевых плагинов к контейнерным оркестраторам Container Network Interface (CNI), позволяющая нарушителю оказать влияние на целостность, доступность и конфиденциальность защищаемой информации | CVSS3: 7.2 | 0% Низкий | около 5 лет назад | |
SUSE-SU-2022:4151-1 Security update for cni-plugins | около 3 лет назад | |||
openSUSE-SU-2022:0770-1 Security update for buildah | почти 4 года назад | |||
SUSE-SU-2022:3766-1 Security update for buildah | больше 3 лет назад | |||
SUSE-SU-2022:3655-1 Security update for buildah | больше 3 лет назад | |||
SUSE-SU-2022:3480-1 Security update for buildah | больше 3 лет назад | |||
SUSE-SU-2022:0770-1 Security update for buildah | почти 4 года назад | |||
SUSE-SU-2023:0326-1 Security update for podman | почти 3 года назад | |||
SUSE-SU-2023:0187-1 Security update for podman | около 3 лет назад |
Уязвимостей на страницу