Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/kubernetes@1.18.5-1?distro=trixie
Typedeb
Namespacedebian
Namekubernetes
Version1.18.5-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.19.3-1
Latest_non_vulnerable_version1.33.4+ds-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2cbk-c4k3-kyc8
vulnerability_id VCID-2cbk-c4k3-kyc8
summary
Privilege Escalation in Kubernetes
The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.16.13, v1.17.9 and v1.18.7 are vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8559.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8559.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8559
reference_id
reference_type
scores
0
value 0.51201
scoring_system epss
scoring_elements 0.97885
published_at 2026-04-24T12:55:00Z
1
value 0.51201
scoring_system epss
scoring_elements 0.97889
published_at 2026-04-18T12:55:00Z
2
value 0.51201
scoring_system epss
scoring_elements 0.97887
published_at 2026-04-21T12:55:00Z
3
value 0.51201
scoring_system epss
scoring_elements 0.9788
published_at 2026-04-13T12:55:00Z
4
value 0.51201
scoring_system epss
scoring_elements 0.97879
published_at 2026-04-12T12:55:00Z
5
value 0.51201
scoring_system epss
scoring_elements 0.97878
published_at 2026-04-11T12:55:00Z
6
value 0.51201
scoring_system epss
scoring_elements 0.97857
published_at 2026-04-01T12:55:00Z
7
value 0.51201
scoring_system epss
scoring_elements 0.97872
published_at 2026-04-08T12:55:00Z
8
value 0.51201
scoring_system epss
scoring_elements 0.97868
published_at 2026-04-07T12:55:00Z
9
value 0.51201
scoring_system epss
scoring_elements 0.97864
published_at 2026-04-04T12:55:00Z
10
value 0.51201
scoring_system epss
scoring_elements 0.97863
published_at 2026-04-02T12:55:00Z
11
value 0.51201
scoring_system epss
scoring_elements 0.97875
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8559
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1851422
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1851422
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8559
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/kubernetes/kubernetes
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes
6
reference_url https://github.com/kubernetes/kubernetes/issues/92914
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/issues/92914
7
reference_url https://github.com/kubernetes/kubernetes/pull/92941
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/92941
8
reference_url https://github.com/tdwyer/CVE-2020-8559
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/tdwyer/CVE-2020-8559
9
reference_url https://groups.google.com/d/msg/kubernetes-security-announce/JAIGG5yNROs/19nHQ5wkBwAJ
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/d/msg/kubernetes-security-announce/JAIGG5yNROs/19nHQ5wkBwAJ
10
reference_url https://groups.google.com/g/kubernetes-security-announce/c/JAIGG5yNROs
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/kubernetes-security-announce/c/JAIGG5yNROs
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-8559
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-8559
12
reference_url https://security.netapp.com/advisory/ntap-20200810-0004
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20200810-0004
13
reference_url https://access.redhat.com/errata/RHSA-2020:4298
reference_id RHSA-2020:4298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4298
14
reference_url https://access.redhat.com/errata/RHSA-2020:5194
reference_id RHSA-2020:5194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5194
15
reference_url https://access.redhat.com/errata/RHSA-2020:5363
reference_id RHSA-2020:5363
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5363
16
reference_url https://access.redhat.com/errata/RHSA-2021:0030
reference_id RHSA-2021:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0030
17
reference_url https://access.redhat.com/errata/RHSA-2021:0281
reference_id RHSA-2021:0281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0281
fixed_packages
0
url pkg:deb/debian/kubernetes@1.18.5-1?distro=trixie
purl pkg:deb/debian/kubernetes@1.18.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.18.5-1%3Fdistro=trixie
1
url pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1?distro=trixie
purl pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-42kp-8t9h-dfat
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.20.5%252Breally1.20.2-1%3Fdistro=trixie
2
url pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1.1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1.1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.20.5%252Breally1.20.2-1.1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/kubernetes@1.32.3%2Bds-2?distro=trixie
purl pkg:deb/debian/kubernetes@1.32.3%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.32.3%252Bds-2%3Fdistro=trixie
4
url pkg:deb/debian/kubernetes@1.33.4%2Bds-1?distro=trixie
purl pkg:deb/debian/kubernetes@1.33.4%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.33.4%252Bds-1%3Fdistro=trixie
aliases CVE-2020-8559, GHSA-33c5-9fx5-fvjm
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2cbk-c4k3-kyc8
1
url VCID-tc46-9vdm-xudz
vulnerability_id VCID-tc46-9vdm-xudz
summary
Improper Authentication in Kubernetes
A security issue was discovered in the Kubelet and kube-proxy components of Kubernetes which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. For example, if a cluster administrator runs a TCP service on a node that listens on 127.0.0.1:1234, because of this bug, that service would be potentially reachable by other hosts on the same LAN as the node, or by containers running on the same node as the service. If the example service on port 1234 required no additional authentication (because it assumed that only other localhost processes could reach it), then it could be vulnerable to attacks that make use of this bug.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8558.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8558.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8558
reference_id
reference_type
scores
0
value 0.20149
scoring_system epss
scoring_elements 0.95456
published_at 2026-04-01T12:55:00Z
1
value 0.20149
scoring_system epss
scoring_elements 0.95493
published_at 2026-04-13T12:55:00Z
2
value 0.20149
scoring_system epss
scoring_elements 0.95492
published_at 2026-04-12T12:55:00Z
3
value 0.20149
scoring_system epss
scoring_elements 0.9549
published_at 2026-04-11T12:55:00Z
4
value 0.20149
scoring_system epss
scoring_elements 0.95485
published_at 2026-04-09T12:55:00Z
5
value 0.20149
scoring_system epss
scoring_elements 0.95482
published_at 2026-04-08T12:55:00Z
6
value 0.20149
scoring_system epss
scoring_elements 0.95476
published_at 2026-04-07T12:55:00Z
7
value 0.20149
scoring_system epss
scoring_elements 0.95472
published_at 2026-04-04T12:55:00Z
8
value 0.20149
scoring_system epss
scoring_elements 0.95466
published_at 2026-04-02T12:55:00Z
9
value 0.20149
scoring_system epss
scoring_elements 0.9551
published_at 2026-04-24T12:55:00Z
10
value 0.20149
scoring_system epss
scoring_elements 0.95509
published_at 2026-04-21T12:55:00Z
11
value 0.20149
scoring_system epss
scoring_elements 0.95506
published_at 2026-04-18T12:55:00Z
12
value 0.20149
scoring_system epss
scoring_elements 0.95501
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8558
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1843358
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1843358
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8558
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8558
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/bottlerocket-os/bottlerocket/security/advisories/GHSA-wqv3-8cm6-h6wg
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/bottlerocket-os/bottlerocket/security/advisories/GHSA-wqv3-8cm6-h6wg
6
reference_url https://github.com/kubernetes/kubernetes
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes
7
reference_url https://github.com/kubernetes/kubernetes/issues/92315
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/issues/92315
8
reference_url https://github.com/tabbysable/POC-2020-8558
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/tabbysable/POC-2020-8558
9
reference_url https://groups.google.com/g/kubernetes-announce/c/sI4KmlH3S2I/m/TljjxOBvBQAJ
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/kubernetes-announce/c/sI4KmlH3S2I/m/TljjxOBvBQAJ
10
reference_url https://groups.google.com/g/kubernetes-security-announce/c/B1VegbBDMTE
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/kubernetes-security-announce/c/B1VegbBDMTE
11
reference_url https://labs.bishopfox.com/tech-blog/bad-pods-kubernetes-pod-privilege-escalation
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://labs.bishopfox.com/tech-blog/bad-pods-kubernetes-pod-privilege-escalation
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-8558
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-8558
13
reference_url https://security.netapp.com/advisory/ntap-20200821-0001
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20200821-0001
14
reference_url https://www.openwall.com/lists/oss-security/2020/07/08/1
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.openwall.com/lists/oss-security/2020/07/08/1
15
reference_url https://access.redhat.com/errata/RHSA-2020:2412
reference_id RHSA-2020:2412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2412
16
reference_url https://access.redhat.com/errata/RHSA-2020:2413
reference_id RHSA-2020:2413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2413
17
reference_url https://access.redhat.com/errata/RHSA-2020:2926
reference_id RHSA-2020:2926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2926
18
reference_url https://access.redhat.com/errata/RHSA-2020:2927
reference_id RHSA-2020:2927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2927
19
reference_url https://access.redhat.com/errata/RHSA-2020:2992
reference_id RHSA-2020:2992
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2992
20
reference_url https://access.redhat.com/errata/RHSA-2020:3183
reference_id RHSA-2020:3183
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3183
21
reference_url https://access.redhat.com/errata/RHSA-2020:3184
reference_id RHSA-2020:3184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3184
fixed_packages
0
url pkg:deb/debian/kubernetes@1.18.5-1?distro=trixie
purl pkg:deb/debian/kubernetes@1.18.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.18.5-1%3Fdistro=trixie
1
url pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1?distro=trixie
purl pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-42kp-8t9h-dfat
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.20.5%252Breally1.20.2-1%3Fdistro=trixie
2
url pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1.1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1.1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.20.5%252Breally1.20.2-1.1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/kubernetes@1.32.3%2Bds-2?distro=trixie
purl pkg:deb/debian/kubernetes@1.32.3%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.32.3%252Bds-2%3Fdistro=trixie
4
url pkg:deb/debian/kubernetes@1.33.4%2Bds-1?distro=trixie
purl pkg:deb/debian/kubernetes@1.33.4%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.33.4%252Bds-1%3Fdistro=trixie
aliases CVE-2020-8558, GHSA-wqv3-8cm6-h6wg
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tc46-9vdm-xudz
2
url VCID-wpwc-fkd7-qugm
vulnerability_id VCID-wpwc-fkd7-qugm
summary
Denial of service in Kubernetes
The Kubernetes kubelet component in versions 1.1-1.16.12, 1.17.0-1.17.8 and 1.18.0-1.18.5 do not account for disk usage by a pod which writes to its own /etc/hosts file. The /etc/hosts file mounted in a pod by kubelet is not included by the kubelet eviction manager when calculating ephemeral storage usage by a pod. If a pod writes a large amount of data to the /etc/hosts file, it could fill the storage space of the node and cause the node to fail.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8557.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8557.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8557
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.2939
published_at 2026-04-24T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29607
published_at 2026-04-12T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29503
published_at 2026-04-21T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29548
published_at 2026-04-18T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29574
published_at 2026-04-16T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29555
published_at 2026-04-13T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29612
published_at 2026-04-08T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29678
published_at 2026-04-02T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29729
published_at 2026-04-04T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29549
published_at 2026-04-07T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29649
published_at 2026-04-09T12:55:00Z
11
value 0.00111
scoring_system epss
scoring_elements 0.29652
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8557
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8557
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8557
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/advisories/GHSA-55qj-gj3x-jq9r
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-55qj-gj3x-jq9r
5
reference_url https://github.com/kubernetes/kubernetes
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes
6
reference_url https://github.com/kubernetes/kubernetes/commit/530f199b6e07cdaab32361e39709ac45f3fdc446
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/commit/530f199b6e07cdaab32361e39709ac45f3fdc446
7
reference_url https://github.com/kubernetes/kubernetes/commit/68750fefd3df76b7b008ef7b18e8acd18d5c2f2e
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/commit/68750fefd3df76b7b008ef7b18e8acd18d5c2f2e
8
reference_url https://github.com/kubernetes/kubernetes/commit/7fd849cffa2f93061fbcb0a6ae4efd0539b1e981
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/commit/7fd849cffa2f93061fbcb0a6ae4efd0539b1e981
9
reference_url https://github.com/kubernetes/kubernetes/issues/93032
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/issues/93032
10
reference_url https://github.com/kubernetes/kubernetes/pull/92921
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/92921
11
reference_url https://groups.google.com/g/kubernetes-security-announce/c/cB_JUsYEKyY/m/vVSO61AhBwAJ
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/kubernetes-security-announce/c/cB_JUsYEKyY/m/vVSO61AhBwAJ
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-8557
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-8557
13
reference_url https://pkg.go.dev/vuln/GO-2024-2753
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2024-2753
14
reference_url https://security.netapp.com/advisory/ntap-20200821-0002
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20200821-0002
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1835977
reference_id 1835977
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1835977
16
reference_url https://access.redhat.com/errata/RHSA-2020:3519
reference_id RHSA-2020:3519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3519
17
reference_url https://access.redhat.com/errata/RHSA-2020:3520
reference_id RHSA-2020:3520
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3520
18
reference_url https://access.redhat.com/errata/RHSA-2020:3579
reference_id RHSA-2020:3579
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3579
19
reference_url https://access.redhat.com/errata/RHSA-2020:3580
reference_id RHSA-2020:3580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3580
20
reference_url https://access.redhat.com/errata/RHSA-2020:3808
reference_id RHSA-2020:3808
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3808
21
reference_url https://access.redhat.com/errata/RHSA-2020:3809
reference_id RHSA-2020:3809
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3809
22
reference_url https://access.redhat.com/errata/RHSA-2021:3915
reference_id RHSA-2021:3915
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3915
fixed_packages
0
url pkg:deb/debian/kubernetes@1.18.5-1?distro=trixie
purl pkg:deb/debian/kubernetes@1.18.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.18.5-1%3Fdistro=trixie
1
url pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1?distro=trixie
purl pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-42kp-8t9h-dfat
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.20.5%252Breally1.20.2-1%3Fdistro=trixie
2
url pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1.1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1.1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.20.5%252Breally1.20.2-1.1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/kubernetes@1.32.3%2Bds-2?distro=trixie
purl pkg:deb/debian/kubernetes@1.32.3%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.32.3%252Bds-2%3Fdistro=trixie
4
url pkg:deb/debian/kubernetes@1.33.4%2Bds-1?distro=trixie
purl pkg:deb/debian/kubernetes@1.33.4%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.33.4%252Bds-1%3Fdistro=trixie
aliases CVE-2020-8557, GHSA-55qj-gj3x-jq9r
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wpwc-fkd7-qugm
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.18.5-1%3Fdistro=trixie