- Sort Score
- Result 10 results
- Languages All
Results 1 - 4 of 4 for vulnerable (0.16 sec)
-
CHANGELOG/CHANGELOG-1.24.md
- [CVE-2021-25749: <code>runAsNonRoot</code> logic bypass for Windows containers](#cve-2021-25749-runasnonroot-logic-bypass-for-windows-containers) - [Am I vulnerable?](#am-i-vulnerable) - [Affected Versions](#affected-versions) - [How do I mitigate this vulnerability?](#how-do-i-mitigate-this-vulnerability) - [Fixed Versions](#fixed-versions) - [Detection](#detection)
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Aug 24 00:02:43 UTC 2023 - 473.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.22.md
- [CVE-2021-25749: <code>runAsNonRoot</code> logic bypass for Windows containers](#cve-2021-25749-runasnonroot-logic-bypass-for-windows-containers) - [Am I vulnerable?](#am-i-vulnerable) - [Affected Versions](#affected-versions) - [How do I mitigate this vulnerability?](#how-do-i-mitigate-this-vulnerability) - [Fixed Versions](#fixed-versions) - [Detection](#detection)
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Dec 13 12:43:45 UTC 2022 - 454.1K bytes - Viewed (0) -
common-protos/k8s.io/api/core/v1/generated.proto
// kubelet. If the kubelet is configured to verify the apiserver's TLS credentials, it does not mean the // connection to the real kubelet is vulnerable to a man in the middle attack (e.g. an attacker could not intercept // the actual log data coming from the real kubelet). // +optional optional bool insecureSkipTLSVerifyBackend = 9; }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 255.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.23.md
This issue has been rated low and assigned CVE-2021-25749 **Am I vulnerable?** All Kubernetes clusters with following versions, running Windows workloads with `runAsNonRoot` are impacted **Affected Versions**: - kubelet v1.20 - v1.21 - kubelet v1.22.0 - v1.22.13
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Feb 28 21:06:52 UTC 2023 - 424.5K bytes - Viewed (0)