Search for packages
| purl | pkg:rpm/redhat/atomic-openshift@3.11.346-1.git.0.ea10721?arch=el7 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-2cbk-c4k3-kyc8
Aliases: CVE-2020-8559 GHSA-33c5-9fx5-fvjm |
Privilege Escalation in Kubernetes The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.16.13, v1.17.9 and v1.18.7 are vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise. | There are no reported fixed by versions. |
|
VCID-x5e9-nj8f-aye9
Aliases: CVE-2018-1002102 |
kubernetes: improper validation of URL redirection in the Kubernetes API server allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T14:14:58.368903+00:00 | RedHat Importer | Affected by | VCID-x5e9-nj8f-aye9 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1002102.json | 38.0.0 |
| 2026-04-01T14:05:42.960875+00:00 | RedHat Importer | Affected by | VCID-2cbk-c4k3-kyc8 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8559.json | 38.0.0 |