Show filters
131 Total Results
Displaying 61-70 of 131
Sort by:
Attacker Value
Unknown

CVE-2021-21661

Disclosure Date: June 10, 2021 (last updated October 26, 2023)
Jenkins Kubernetes CLI Plugin 1.10.0 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
Attacker Value
Unknown

CVE-2021-31938

Disclosure Date: June 08, 2021 (last updated November 28, 2024)
Microsoft VsCode Kubernetes Tools Extension Elevation of Privilege Vulnerability
0
Attacker Value
Unknown

CVE-2020-1742

Disclosure Date: June 07, 2021 (last updated February 22, 2025)
An insecure modification vulnerability flaw was found in containers using nmstate/kubernetes-nmstate-handler. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges. Versions before kubernetes-nmstate-handler-container-v2.3.0-30 are affected.
Attacker Value
Unknown

CVE-2021-3499

Disclosure Date: June 02, 2021 (last updated February 22, 2025)
A vulnerability was found in OVN Kubernetes in versions up to and including 0.3.0 where the Egress Firewall does not reliably apply firewall rules when there is multiple DNS rules. It could lead to potentially lose of confidentiality, integrity or availability of a service.
Attacker Value
Unknown

CVE-2021-25737

Disclosure Date: May 18, 2021 (last updated February 23, 2025)
A security issue was discovered in Kubernetes where a user may be able to redirect pod traffic to private networks on a Node. Kubernetes already prevents creation of Endpoint IPs in the localhost or link-local range, but the same validation was not performed on EndpointSlice IPs.
Attacker Value
Unknown

CVE-2020-8562

Disclosure Date: May 04, 2021 (last updated February 23, 2025)
As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to prevent proxied connections from accessing link-local or localhost networks when making user-driven connections to Services, Pods, Nodes, or StorageClass service providers. As part of this mitigation Kubernetes does a DNS name resolution check and validates that response IPs are not in the link-local (169.254.0.0/16) or localhost (127.0.0.0/8) range. Kubernetes then performs a second DNS resolution without validation for the actual connection. If a non-standard DNS server returns different non-cached responses, a user may be able to bypass the proxy IP restriction and access private networks on the control plane.
Attacker Value
Unknown

CVE-2021-25743

Disclosure Date: May 02, 2021 (last updated February 23, 2025)
kubectl does not neutralize escape, meta or control sequences contained in the raw data it outputs to a terminal. This includes but is not limited to the unstructured string fields in objects such as Events.
Attacker Value
Unknown

CVE-2021-25735

Disclosure Date: April 14, 2021 (last updated February 23, 2025)
A security issue was discovered in kube-apiserver that could allow node updates to bypass a Validating Admission Webhook. Clusters are only affected by this vulnerability if they run a Validating Admission Webhook for Nodes that denies admission based at least partially on the old state of the Node object. Validating Admission Webhook does not observe some previous fields.
Attacker Value
Unknown

CVE-2021-28448

Disclosure Date: April 13, 2021 (last updated November 28, 2024)
Visual Studio Code Kubernetes Tools Remote Code Execution Vulnerability
0
Attacker Value
Unknown

CVE-2021-20218

Disclosure Date: March 16, 2021 (last updated February 22, 2025)
A flaw was found in the fabric8 kubernetes-client in version 4.2.0 and after. This flaw allows a malicious pod/container to cause applications using the fabric8 kubernetes-client `copy` command to extract files outside the working path. The highest threat from this vulnerability is to integrity and system availability. This has been fixed in kubernetes-client-4.13.2 kubernetes-client-5.0.2 kubernetes-client-4.11.2 kubernetes-client-4.7.2