Max CVSS 5.8 Min CVSS 3.6 Total Count2
IDCVSSSummaryLast (major) updatePublished
CVE-2020-15113 3.6
In etcd before versions 3.3.23 and 3.4.10, certain directory paths are created (etcd data directory and the directory path when provided to automatically generate self-signed certificates for TLS connections with clients) with restricted access permi
29-11-2022 - 02:18 05-08-2020 - 20:15
CVE-2020-15115 5.0
etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users' passwords with little computa
21-11-2022 - 20:36 06-08-2020 - 22:15
CVE-2020-15136 5.8
In ectd before versions 3.4.10 and 3.3.23, gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given
18-11-2021 - 18:31 06-08-2020 - 23:15
CVE-2020-15114 4.0
In etcd before versions 3.3.23 and 3.4.10, the etcd gateway is a simple TCP proxy to allow for basic service discovery and access. However, it is possible to include the gateway address as an endpoint. This results in a denial of service, since the e
18-11-2021 - 18:31 06-08-2020 - 23:15
CVE-2020-15106 4.0
In etcd before versions 3.3.23 and 3.4.10, a large slice causes panic in decodeRecord method. The size of a record is stored in the length field of a WAL file and no additional validation is done on this data. Therefore, it is possible to forge an ex
18-11-2021 - 18:30 05-08-2020 - 19:15
CVE-2020-15112 4.0
In etcd before versions 3.3.23 and 3.4.10, it is possible to have an entry index greater then the number of entries in the ReadAll method in wal/wal.go. This could cause issues when WAL entries are being read during consensus as an arbitrary etcd con
18-11-2021 - 18:30 05-08-2020 - 20:15
Back to Top Mark selected
Back to Top