The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade mcp-server-kubernetes to version 3.5.0 or higher.
mcp-server-kubernetes is a MCP server for interacting with Kubernetes clusters via kubectl
Affected versions of this package are vulnerable to Arbitrary Argument Injection through the startPortForward function in src/tools/port_forward.ts. An attacker can inject additional kubectl flags by supplying crafted namespace, resourceType, or resourceName values when starting a port-forward, causing the tool to run kubectl with attacker-controlled arguments. This can redirect the port-forward to unintended resources or alter kubectl behavior, leading to unauthorized access to cluster resources and disruption of the user’s port-forward session.