kubernetes vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kubernetes package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2024-10220

<1.20.5+really1.20.2-1
  • L
CVE-2024-3177

<1.20.5+really1.20.2-1
  • H
Improper Input Validation

<1.20.5+really1.20.2-1
  • H
CVE-2023-3893

<1.20.5+really1.20.2-1
  • H
Improper Input Validation

<1.20.5+really1.20.2-1
  • M
CVE-2023-2431

<1.20.5+really1.20.2-1
  • M
CVE-2023-2727

<1.20.5+really1.20.2-1
  • M
CVE-2023-2728

<1.20.5+really1.20.2-1
  • H
CVE-2022-3294

<1.20.5+really1.20.2-1
  • M
Directory Traversal

<1.20.5+really1.20.2-1
  • H
Server-Side Request Forgery (SSRF)

<1.20.5+really1.20.2-1
  • L
CVE-2021-25743

*
  • H
Files or Directories Accessible to External Parties

<1.20.5+really1.20.2-1
  • M
Externally Controlled Reference to a Resource in Another Sphere

<1.20.5+really1.20.2-1
  • L
Externally Controlled Reference to a Resource in Another Sphere

<1.20.5+really1.20.2-1
  • M
Open Redirect

<1.20.5+really1.20.2-1
  • L
Time-of-check Time-of-use (TOCTOU)

<1.20.5+really1.20.2-1
  • M
Incorrect Authorization

<1.20.5+really1.20.2-1
  • M
Incorrect Authorization

*
  • M
Information Exposure Through Log Files

<1.20.0-1
  • M
Information Exposure Through Log Files

<1.19.3-1
  • M
Information Exposure Through Log Files

<1.19.3-1
  • M
Information Exposure

<1.18.0-1
  • M
Resource Exhaustion

<1.18.5-1
  • M
Open Redirect

<1.18.5-1
  • H
Improper Authentication

<1.18.5-1
  • M
Server-Side Request Forgery (SSRF)

<1.18.2-1
  • M
Excessive Platform Resource Consumption within a Loop

<1.17.4-1
  • M
Allocation of Resources Without Limits or Throttling

<1.17.4-1
  • M
Allocation of Resources Without Limits or Throttling

<1.17.4-1
  • L
Open Redirect

<1.17.4-1
  • H
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<1.17.4-1
  • M
Information Exposure Through Log Files

<1.17.4-1
  • H
Missing Authorization

<1.17.4-1
  • H
Incorrect Authorization

<1.17.4-1
  • H
Always-Incorrect Control Flow Implementation

<1.17.4-1
  • M
Allocation of Resources Without Limits or Throttling

<1.17.4-1
  • C
Error Handling

<1.17.4-1
  • H
Improper Certificate Validation

<1.5.5+dfsg-1
  • M
Improper Input Validation

<1.17.4-1
  • C
Link Following

<1.7.16+dfsg-1
  • M
CVE-2017-1002102

<1.7.16+dfsg-1
  • C
Missing Authorization

<1.5.5+dfsg-1