Show filters
131 Total Results
Displaying 91-100 of 131
Sort by:
Attacker Value
Unknown
CVE-2019-11254
Disclosure Date: March 31, 2020 (last updated February 21, 2025)
The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.
0
Attacker Value
Unknown
CVE-2020-8552
Disclosure Date: March 27, 2020 (last updated February 21, 2025)
The Kubernetes API server component in versions prior to 1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via successful API requests.
0
Attacker Value
Unknown
CVE-2020-8551
Disclosure Date: March 27, 2020 (last updated February 21, 2025)
The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.
0
Attacker Value
Unknown
CVE-2019-11252
Disclosure Date: March 04, 2020 (last updated February 21, 2025)
The Kubernetes kube-controller-manager in versions v1.0-v1.17 is vulnerable to a credential leakage via error messages in mount failure logs and events for AzureFile and CephFS volumes.
0
Attacker Value
Unknown
CVE-2020-2121
Disclosure Date: February 12, 2020 (last updated October 26, 2023)
Jenkins Google Kubernetes Engine Plugin 0.8.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
0
Attacker Value
Unknown
CVE-2019-11251
Disclosure Date: February 03, 2020 (last updated February 21, 2025)
The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree.
0
Attacker Value
Unknown
CVE-2019-16575
Disclosure Date: December 17, 2019 (last updated October 26, 2023)
A cross-site request forgery vulnerability in Jenkins Alauda Kubernetes Suport Plugin 2.3.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing the Kubernetes service account token or credentials stored in Jenkins.
0
Attacker Value
Unknown
Kubernetes API server follows unvalidated redirects from streaming Kubelet endp…
Disclosure Date: December 05, 2019 (last updated November 08, 2023)
Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate credentials for authenticating to the Kubelet.
0
Attacker Value
Unknown
CVE-2019-10469
Disclosure Date: October 23, 2019 (last updated October 26, 2023)
A missing permission check in Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
0
Attacker Value
Unknown
CVE-2019-10468
Disclosure Date: October 23, 2019 (last updated October 26, 2023)
A cross-site request forgery vulnerability in Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
0