Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-qxw4-2hry-uuf4
Summary
Kubernetes Improper Input Validation vulnerability
A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes.
Aliases
0
alias CVE-2023-5528
1
alias GHSA-hq6q-c2x6-hmch
Fixed_packages
0
url pkg:deb/debian/kubernetes@0?distro=trixie
purl pkg:deb/debian/kubernetes@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@0%3Fdistro=trixie
1
url pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1?distro=trixie
purl pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-42kp-8t9h-dfat
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.20.5%252Breally1.20.2-1%3Fdistro=trixie
2
url pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1.1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1.1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.20.5%252Breally1.20.2-1.1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/kubernetes@1.32.3%2Bds-2?distro=trixie
purl pkg:deb/debian/kubernetes@1.32.3%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.32.3%252Bds-2%3Fdistro=trixie
4
url pkg:deb/debian/kubernetes@1.33.4%2Bds-1?distro=trixie
purl pkg:deb/debian/kubernetes@1.33.4%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.33.4%252Bds-1%3Fdistro=trixie
5
url pkg:ebuild/sys-cluster/kubelet@1.28.5
purl pkg:ebuild/sys-cluster/kubelet@1.28.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/kubelet@1.28.5
6
url pkg:golang/k8s.io/kubernetes@1.25.16
purl pkg:golang/k8s.io/kubernetes@1.25.16
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/k8s.io/kubernetes@1.25.16
7
url pkg:golang/k8s.io/kubernetes@1.26.11
purl pkg:golang/k8s.io/kubernetes@1.26.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/k8s.io/kubernetes@1.26.11
8
url pkg:golang/k8s.io/kubernetes@1.27.8
purl pkg:golang/k8s.io/kubernetes@1.27.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/k8s.io/kubernetes@1.27.8
9
url pkg:golang/k8s.io/kubernetes@1.28.4
purl pkg:golang/k8s.io/kubernetes@1.28.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/k8s.io/kubernetes@1.28.4
Affected_packages
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5528.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5528.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5528
reference_id
reference_type
scores
0
value 0.18507
scoring_system epss
scoring_elements 0.95259
published_at 2026-04-24T12:55:00Z
1
value 0.18507
scoring_system epss
scoring_elements 0.95257
published_at 2026-04-18T12:55:00Z
2
value 0.18507
scoring_system epss
scoring_elements 0.95254
published_at 2026-04-16T12:55:00Z
3
value 0.18507
scoring_system epss
scoring_elements 0.95246
published_at 2026-04-13T12:55:00Z
4
value 0.18507
scoring_system epss
scoring_elements 0.95243
published_at 2026-04-12T12:55:00Z
5
value 0.18507
scoring_system epss
scoring_elements 0.95242
published_at 2026-04-11T12:55:00Z
6
value 0.18507
scoring_system epss
scoring_elements 0.95237
published_at 2026-04-09T12:55:00Z
7
value 0.18507
scoring_system epss
scoring_elements 0.95233
published_at 2026-04-08T12:55:00Z
8
value 0.18507
scoring_system epss
scoring_elements 0.95226
published_at 2026-04-07T12:55:00Z
9
value 0.18507
scoring_system epss
scoring_elements 0.95222
published_at 2026-04-04T12:55:00Z
10
value 0.18507
scoring_system epss
scoring_elements 0.9522
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5528
2
reference_url https://github.com/kubernetes/kubernetes
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes
3
reference_url https://github.com/kubernetes/kubernetes/issues/121879
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/issues/121879
4
reference_url https://github.com/kubernetes/kubernetes/pull/121881
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/121881
5
reference_url https://github.com/kubernetes/kubernetes/pull/121882
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/121882
6
reference_url https://github.com/kubernetes/kubernetes/pull/121883
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/121883
7
reference_url https://github.com/kubernetes/kubernetes/pull/121884
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/121884
8
reference_url https://github.com/kubernetes/kubernetes/pull/121885
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/pull/121885
9
reference_url https://groups.google.com/g/kubernetes-security-announce/c/SL_d4NR8pzA
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/kubernetes-security-announce/c/SL_d4NR8pzA
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JH444PWZBINXLLFV7XLIJIZJHSK6UEZ
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JH444PWZBINXLLFV7XLIJIZJHSK6UEZ
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4XZIX727JIKF5RQW7RVVBLWXBCDIBJA7
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4XZIX727JIKF5RQW7RVVBLWXBCDIBJA7
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MPGMITSZXUCAVO7Q75675SOLXC2XXU4
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MPGMITSZXUCAVO7Q75675SOLXC2XXU4
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-5528
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-5528
14
reference_url https://security.netapp.com/advisory/ntap-20240119-0009
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240119-0009
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2247163
reference_id 2247163
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2247163
16
reference_url https://security.gentoo.org/glsa/202405-31
reference_id GLSA-202405-31
reference_type
scores
url https://security.gentoo.org/glsa/202405-31
17
reference_url https://access.redhat.com/errata/RHSA-2023:7662
reference_id RHSA-2023:7662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7662
18
reference_url https://access.redhat.com/errata/RHSA-2023:7709
reference_id RHSA-2023:7709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7709
19
reference_url https://access.redhat.com/errata/RHSA-2023:7710
reference_id RHSA-2023:7710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7710
20
reference_url https://access.redhat.com/errata/RHSA-2024:0954
reference_id RHSA-2024:0954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0954
21
reference_url https://access.redhat.com/errata/RHSA-2024:1203
reference_id RHSA-2024:1203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1203
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score7.0 - 8.9
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-qxw4-2hry-uuf4