Search for packages
| purl | pkg:deb/debian/kubernetes@1.31.4%2Bds-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-42kp-8t9h-dfat | kubectl ANSI escape characters not filtered kubectl (k8s.io/kubernetes/pkg/kubectl) does not neutralize escape, meta or control sequences contained in the raw data it outputs to a terminal. This includes but is not limited to the unstructured string fields in objects such as Events. |
CVE-2021-25743
GHSA-f9jg-8p32-2f55 |
| VCID-vctf-a4t5-q7a2 | Unverified Ownership in Kubernetes Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect. |
CVE-2020-8554
GHSA-j9wf-vvm6-4r9w |
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-16T11:52:26.945993+00:00 | Debian Importer | Fixing | VCID-vctf-a4t5-q7a2 | https://security-tracker.debian.org/tracker/data/json | 38.4.0 |
| 2026-04-13T08:06:25.786263+00:00 | Debian Importer | Fixing | VCID-vctf-a4t5-q7a2 | https://security-tracker.debian.org/tracker/data/json | 38.3.0 |
| 2026-04-03T07:28:15.924086+00:00 | Debian Importer | Fixing | VCID-42kp-8t9h-dfat | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |
| 2026-04-03T07:28:15.240509+00:00 | Debian Importer | Fixing | VCID-vctf-a4t5-q7a2 | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |