The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of K8s

Kubernetes: overload via kube-apiserver YAML
An attacker can trigger an overload via kube-apiserver YAML of Kubernetes, in order to trigger a denial of service...
6208032, 6208039, 6208048, 6208052, 6208328, 6208330, 6208332, 6208333, 6208336, 89535, CVE-2019-11254, VIGILANCE-VUL-31915
Kubernetes: denial of service via API Server
An attacker can trigger a fatal error via API Server of Kubernetes, in order to trigger a denial of service...
6234196, CVE-2020-8552, VIGILANCE-VUL-31861
Kubernetes: denial of service via Kubelet
An attacker can trigger a fatal error via Kubelet of Kubernetes, in order to trigger a denial of service...
6234196, CVE-2020-8551, VIGILANCE-VUL-31860
Kubernetes: information disclosure via API Server URL Redirection
An attacker can bypass access restrictions to data via API Server URL Redirection of Kubernetes, in order to obtain sensitive information...
85867, CVE-2018-1002102, FEDORA-2020-943f4b03d2, VIGILANCE-VUL-31306
Kubernetes: information disclosure via Container Storage Interface
An attacker can bypass access restrictions to data via Container Storage Interface of Kubernetes, in order to obtain sensitive information...
CVE-2019-11255, VIGILANCE-VUL-30883
Kubernetes: infinite loop via Json/yaml Decoding
An attacker can trigger an infinite loop via Json/yaml Decoding of Kubernetes, in order to trigger a denial of service...
1167142, 83253, CVE-2019-11253, VIGILANCE-VUL-30640
Kubernetes: directory traversal via Kubectl Symlinks
An attacker can traverse directories via Kubectl Symlinks of Kubernetes, in order to create a file outside the service root path...
1274986, CVE-2019-11251, VIGILANCE-VUL-30362
Kubernetes: information disclosure via Bearer Tokens
An attacker can bypass access restrictions to data via Bearer Tokens of Kubernetes, in order to obtain sensitive information...
81114, CVE-2019-11250, FEDORA-2019-2b8ef08c95, VIGILANCE-VUL-30148
Kubernetes: information disclosure via /debug/pprof
An attacker can bypass access restrictions to data via /debug/pprof of Kubernetes, in order to obtain sensitive information...
CVE-2019-11248, FEDORA-2019-2b8ef08c95, VIGILANCE-VUL-30147
HTTP/2: multiple vulnerabilities
An attacker can use several vulnerabilities of HTTP/2...
1072144, 1072860, 1167160, 6198380, bulletinoct2019, CERTFR-2019-AVI-389, cpuapr2020, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, DSA-4503-1, DSA-4505-1, DSA-4508-1, DSA-4511-1, DSA-4520-1, DSA-4669-1, FEDORA-2019-1686ae9b59, FEDORA-2019-5a6a7bc12c, FEDORA-2019-63ba15cc83, FEDORA-2019-7443ebda4b, FEDORA-2019-81985a8858, FEDORA-2019-8a437d5c2f, FEDORA-2019-befd924cfe, HT210436, NFLX-2019-002, openSUSE-SU-2019:2000-1, openSUSE-SU-2019:2051-1, openSUSE-SU-2019:2056-1, openSUSE-SU-2019:2072-1, openSUSE-SU-2019:2085-1, openSUSE-SU-2019:2114-1, openSUSE-SU-2019:2115-1, openSUSE-SU-2019:2120-1, openSUSE-SU-2019:2130-1, openSUSE-SU-2019:2232-1, openSUSE-SU-2019:2234-1, openSUSE-SU-2019:2264-1, RHSA-2019:2692-01, RHSA-2019:2726-01, RHSA-2019:2745-01, RHSA-2019:2746-01, RHSA-2019:2775-01, RHSA-2019:2799-01, RHSA-2019:2893-01, RHSA-2019:2925-01, RHSA-2019:2939-01, RHSA-2019:2949-01, RHSA-2019:2955-01, RHSA-2019:4018-01, RHSA-2019:4019-01, RHSA-2019:4020-01, RHSA-2019:4021-01, RHSA-2019:4040-01, RHSA-2019:4041-01, RHSA-2019:4042-01, RHSA-2019:4045-01, RHSA-2019:4269-01, RHSA-2019:4273-01, RHSA-2020:0406-01, SSA:2020-091-02, SUSE-SU-2019:2213-1, SUSE-SU-2019:2214-1, SUSE-SU-2019:2237-1, SUSE-SU-2019:2254-1, SUSE-SU-2019:2259-1, SUSE-SU-2019:2260-1, SUSE-SU-2019:2309-1, SUSE-SU-2019:2329-1, SUSE-SU-2019:2473-1, SUSE-SU-2019:2559-1, SUSE-SU-2020:0059-1, Synology-SA-19:33, Synology-SA-19:37, USN-4099-1, USN-4113-1, USN-4113-2, USN-4308-1, VIGILANCE-VUL-30040, VU#605641
Our database contains other pages. You can request a free trial to read them.

Display information about K8s: