Логотип exploitDog
bind:CVE-2025-68152
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-68152

Количество 4

Количество 4

ubuntu логотип

CVE-2025-68152

7 дней назад

Juju is an open source application orchestration engine that enables any application operation on any infrastructure at any scale through special operators called ‘charms’. From versions 2.9 to before 2.9.56 and 3.6 to before 3.6.19, it is possible that a compromised workload machine under a Juju controller can read any log file for any entity in any model at any level. This issue has been patched in versions 2.9.56 and 3.6.19.

EPSS: Низкий
nvd логотип

CVE-2025-68152

7 дней назад

Juju is an open source application orchestration engine that enables any application operation on any infrastructure at any scale through special operators called ‘charms’. From versions 2.9 to before 2.9.56 and 3.6 to before 3.6.19, it is possible that a compromised workload machine under a Juju controller can read any log file for any entity in any model at any level. This issue has been patched in versions 2.9.56 and 3.6.19.

EPSS: Низкий
debian логотип

CVE-2025-68152

7 дней назад

Juju is an open source application orchestration engine that enables a ...

EPSS: Низкий
github логотип

GHSA-j6f6-jp3p-53mw

7 дней назад

Juju: Read All Controller Logs From Compromised Workload

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-68152

Juju is an open source application orchestration engine that enables any application operation on any infrastructure at any scale through special operators called ‘charms’. From versions 2.9 to before 2.9.56 and 3.6 to before 3.6.19, it is possible that a compromised workload machine under a Juju controller can read any log file for any entity in any model at any level. This issue has been patched in versions 2.9.56 and 3.6.19.

0%
Низкий
7 дней назад
nvd логотип
CVE-2025-68152

Juju is an open source application orchestration engine that enables any application operation on any infrastructure at any scale through special operators called ‘charms’. From versions 2.9 to before 2.9.56 and 3.6 to before 3.6.19, it is possible that a compromised workload machine under a Juju controller can read any log file for any entity in any model at any level. This issue has been patched in versions 2.9.56 and 3.6.19.

0%
Низкий
7 дней назад
debian логотип
CVE-2025-68152

Juju is an open source application orchestration engine that enables a ...

0%
Низкий
7 дней назад
github логотип
GHSA-j6f6-jp3p-53mw

Juju: Read All Controller Logs From Compromised Workload

0%
Низкий
7 дней назад

Уязвимостей на страницу