The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Kubernetes

Kubernetes kubelet: privilege escalation via Root Uid Container
An attacker can bypass restrictions via Root Uid Container of Kubernetes kubelet, in order to escalate his privileges...
CVE-2019-11245, VIGILANCE-VUL-29443
Kubernetes: wrong access right assignement to cached files
When a user specifies a world writable folder as cache, Kubernetes creates new files as world writable. A local attacker can read and write to the user files...
76676, CVE-2019-11244, VIGILANCE-VUL-29125
kubernetes: credential disclosure via rest.AnonymousClientConfig
An attacker can bypass access restrictions to data via rest.AnonymousClientConfig() of kubernetes, in order to obtain sensitive information...
76797, CVE-2019-11243, VIGILANCE-VUL-29107
Kubernetes: directory traversal via Kubectl Cp
An attacker can traverse directories via Kubectl Cp of Kubernetes, in order to read a file outside the service root path...
CVE-2019-1002101, FEDORA-2019-bf800b1c04, ibm10882578, ibm10882596, ibm10882756, ibm10882762, ibm10882952, ibm10882956, VIGILANCE-VUL-28919
Kubernetes: infinite loop via API Server json-patch
An attacker can trigger an infinite loop via API Server json-patch of Kubernetes, in order to trigger a denial of service...
CVE-2019-1002100, ibm10879473, VIGILANCE-VUL-28640
Go: three vulnerabilities
An attacker can use several vulnerabilities of Go...
CVE-2018-16873, CVE-2018-16874, CVE-2018-16875, openSUSE-SU-2018:4181-1, openSUSE-SU-2018:4255-1, openSUSE-SU-2018:4306-1, openSUSE-SU-2019:0170-1, openSUSE-SU-2019:0189-1, openSUSE-SU-2019:0208-1, openSUSE-SU-2019:0295-1, openSUSE-SU-2019:1079-1, openSUSE-SU-2019:1444-1, openSUSE-SU-2019:1499-1, openSUSE-SU-2019:1506-1, openSUSE-SU-2019:1703-1, openSUSE-SU-2020:0554-1, SUSE-SU-2018:4297-1, SUSE-SU-2019:0048-1, SUSE-SU-2019:0048-2, SUSE-SU-2019:0286-1, SUSE-SU-2019:0495-1, SUSE-SU-2019:0573-1, SUSE-SU-2019:1234-1, SUSE-SU-2019:1234-2, SUSE-SU-2019:1264-1, VIGILANCE-VUL-28056
Kubernetes: code execution via PowerShell Smb Mount
An attacker can use a vulnerability via PowerShell Smb Mount of Kubernetes, in order to run code...
65750, CVE-2018-1002101, VIGILANCE-VUL-27968
Kubernetes: code execution via API Server Proxied Requests
An attacker can use a vulnerability via API Server Proxied Requests of Kubernetes, in order to run code...
71411, CVE-2018-1002105, FEDORA-2019-3ecff65275, openSUSE-SU-2020:0554-1, VIGILANCE-VUL-27942
Perl Core: buffer overflow via S_regatom
An attacker can generate a buffer overflow via S_regatom() of Perl Core, in order to trigger a denial of service, and possibly to run code...
bulletinapr2019, cpujul2020, CVE-2018-18314, DSA-4347-1, FEDORA-2018-9dbe983805, FEDORA-2018-ca03363d57, NTAP-20190221-0003, openSUSE-SU-2018:4258-1, RHSA-2019:0001-01, RHSA-2019:0010-01, SUSE-SU-2018:4187-1, USN-3834-1, USN-3834-2, VIGILANCE-VUL-27919
Perl Core: buffer overflow via Regular Expression Compilation
An attacker can generate a buffer overflow via Regular Expression Compilation of Perl Core, in order to trigger a denial of service, and possibly to run code...
133423, bulletinapr2019, cpujul2020, CVE-2018-18312, DSA-4347-1, FEDORA-2018-9dbe983805, FEDORA-2018-ca03363d57, NTAP-20190221-0003, openSUSE-SU-2018:4258-1, RHSA-2019:0001-01, RHSA-2019:0010-01, SUSE-SU-2018:4187-1, USN-3834-1, USN-3834-2, VIGILANCE-VUL-27917
Our database contains other pages. You can request a free trial to read them.

Display information about Kubernetes: