7.5
CVSSv2

CVE-2017-1000081

Published: 17/07/2017 Updated: 07/12/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Linux foundation ONOS 1.9.0 is vulnerable to unauthenticated upload of applications (.oar) resulting in remote code execution.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

onosproject onos 1.8.0

onosproject onos 1.9.0

Github Repositories

Step-by-step guide to sign Images and enforce deploy-time validation on GKE using Container Analysis API and Kritis

Kubernetes Image Signingwith GCP Container Analysisand Kritis This guide will show you how to sign your Images and setup GKE Kubernetes Cluster to enforce deploy-time security policies using the Google Cloud Container Analysis API and Kritis Variables used in this document ${GCP_PROJECT} - GCP Project ID ${IMAGE_NAME} - Docker Image name ${IMAGE_TAG} - Docker Image tag ${IMAG

Deploy-time Policy Enforcer for Kubernetes applications

Kritis [][BuildStatus Result] Kritis (“judge” in Greek), is an open-source solution for securing your software supply chain for Kubernetes applications Kritis enforces deploy-time security policies using the Google Cloud Container Analysis API, and in a subsequent release, Grafeas Here is an example Kritis policy, to prevent the deployment of Pod with a critica