Max CVSS | 5.8 | Min CVSS | 4.0 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2019-1002100 | 4.0 |
In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Ty
|
01-03-2023 - 14:54 | 01-04-2019 - 14:29 | |
CVE-2019-11253 | 5.0 |
Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CP
|
02-10-2020 - 17:11 | 17-10-2019 - 16:15 | |
CVE-2019-11249 | 5.8 |
The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user’s ma
|
02-10-2020 - 16:45 | 29-08-2019 - 01:15 |