Show filters
99 Total Results
Displaying 61-70 of 99
Sort by:
Attacker Value
Unknown

CVE-2020-8559

Disclosure Date: July 15, 2020 (last updated February 21, 2025)
The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.16.13, v1.17.9 and v1.18.6 are vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise.
Attacker Value
Unknown

CVE-2020-8557

Disclosure Date: July 15, 2020 (last updated February 21, 2025)
The Kubernetes kubelet component in versions 1.1-1.16.12, 1.17.0-1.17.8 and 1.18.0-1.18.5 do not account for disk usage by a pod which writes to its own /etc/hosts file. The /etc/hosts file mounted in a pod by kubelet is not included by the kubelet eviction manager when calculating ephemeral storage usage by a pod. If a pod writes a large amount of data to the /etc/hosts file, it could fill the storage space of the node and cause the node to fail.
Attacker Value
Unknown

CVE-2020-8555

Disclosure Date: June 05, 2020 (last updated February 21, 2025)
The Kubernetes kube-controller-manager in versions v1.0-1.14, versions prior to v1.15.12, v1.16.9, v1.17.5, and version v1.18.0 are vulnerable to a Server Side Request Forgery (SSRF) that allows certain authorized users to leak up to 500 bytes of arbitrary information from unprotected endpoints within the master's host network (such as link-local or loopback services).
Attacker Value
Unknown

CVE-2020-8558

Disclosure Date: April 18, 2020 (last updated February 21, 2025)
The Kubelet and kube-proxy components in versions 1.1.0-1.16.10, 1.17.0-1.17.6, and 1.18.0-1.18.3 were found to contain a security issue which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. Such a service is generally thought to be reachable only by other processes on the same host, but due to this defeect, could be reachable by other hosts on the same LAN as the node, or by containers running on the same node as the service.
Attacker Value
Unknown

CVE-2019-11254

Disclosure Date: March 31, 2020 (last updated February 21, 2025)
The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.
Attacker Value
Unknown

CVE-2020-8552

Disclosure Date: March 27, 2020 (last updated February 21, 2025)
The Kubernetes API server component in versions prior to 1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via successful API requests.
Attacker Value
Unknown

CVE-2020-8551

Disclosure Date: March 27, 2020 (last updated February 21, 2025)
The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.
Attacker Value
Unknown

CVE-2019-11252

Disclosure Date: March 04, 2020 (last updated February 21, 2025)
The Kubernetes kube-controller-manager in versions v1.0-v1.17 is vulnerable to a credential leakage via error messages in mount failure logs and events for AzureFile and CephFS volumes.
Attacker Value
Unknown

CVE-2019-11251

Disclosure Date: February 03, 2020 (last updated February 21, 2025)
The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree.
Attacker Value
Unknown

CVE-2018-1002104

Disclosure Date: January 14, 2020 (last updated February 21, 2025)
Versions < 1.5 of the Kubernetes ingress default backend, which handles invalid ingress traffic, exposed prometheus metrics publicly.