We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
In GitHub Security Advisory GHSA-p3x5-5xpx-9phm, there is a vulnerability in the following Go packages or modules:
Cross references:
See doc/triage.md for instructions on how to triage this report.
modules: - module: k8s.io/ingress-nginx versions: - fixed: 1.5.0 vulnerable_at: 1.0.0-alpha.1 packages: - package: k8s.io/ingress-nginx summary: Kubernetes ingress exposes sensitive information description: |- Versions < 1.5 of the Kubernetes ingress default backend, which handles invalid ingress traffic, exposed prometheus metrics publicly. cves: - CVE-2018-1002104 ghsas: - GHSA-p3x5-5xpx-9phm references: - web: https://nvd.nist.gov/vuln/detail/CVE-2018-1002104 - fix: https://github.com/kubernetes/ingress-nginx/pull/3125 - advisory: https://github.com/advisories/GHSA-p3x5-5xpx-9phm
The text was updated successfully, but these errors were encountered:
Change https://go.dev/cl/514636 mentions this issue: data/excluded: batch add 31 excluded reports
data/excluded: batch add 31 excluded reports
Sorry, something went wrong.
2439098
Change https://go.dev/cl/592762 mentions this issue: data/reports: unexclude 75 reports
data/reports: unexclude 75 reports
neild
No branches or pull requests
In GitHub Security Advisory GHSA-p3x5-5xpx-9phm, there is a vulnerability in the following Go packages or modules:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: