尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Kubernetes | Kubernetes | prior to 1.12.10 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | POC for CVE-2019-11248, remote code execution (RCE) | https://github.com/nop2nop/cve-2019-11248 | POC详情 |
| 2 | POC for CVE-2019-11248, remote code execution (RCE) | https://github.com/masm3264/poc-CVE-2019-11248 | POC详情 |
| 3 | None | https://github.com/nod3jzzz/poc-CVE-2019-11248 | POC详情 |
| 4 | None | https://github.com/g1thubb001/poc-CVE-2019-11248 | POC详情 |
| 5 | cve-2019-11248 cve-2020-1938 | https://github.com/bash3rt3am/poc-cve | POC详情 |
| 6 | The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-11248.yaml | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论