{"url":"http://public2.vulnerablecode.io/api/packages/529111?format=json","purl":"pkg:apk/alpine/k3s@1.18.3.1-r0?arch=armv7&distroversion=v3.15&reponame=community","type":"apk","namespace":"alpine","name":"k3s","version":"1.18.3.1-r0","qualifiers":{"arch":"armv7","distroversion":"v3.15","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.18.6.1-r0","latest_non_vulnerable_version":"1.21.3.1-r0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54740?format=json","vulnerability_id":"VCID-er95-u3yh-2ya9","summary":"containernetworking/plugins vulnerable to MitM attacks\nA vulnerability was found in all versions of containernetworking/plugins before version 0.8.6, that allows malicious containers in Kubernetes clusters to perform man-in-the-middle (MitM) attacks. A malicious container can exploit this flaw by sending rogue IPv6 router advertisements to the host or other containers, to redirect traffic to the malicious container.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00063.html","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00063.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00065.html","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00065.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10749.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10749.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10749","reference_id":"","reference_type":"","scores":[{"value":"0.05187","scoring_system":"epss","scoring_elements":"0.89941","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05187","scoring_system":"epss","scoring_elements":"0.89879","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05187","scoring_system":"epss","scoring_elements":"0.89891","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05187","scoring_system":"epss","scoring_elements":"0.89897","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05187","scoring_system":"epss","scoring_elements":"0.89913","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05187","scoring_system":"epss","scoring_elements":"0.89918","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05187","scoring_system":"epss","scoring_elements":"0.89926","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05187","scoring_system":"epss","scoring_elements":"0.89924","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05187","scoring_system":"epss","scoring_elements":"0.89917","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05187","scoring_system":"epss","scoring_elements":"0.89931","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05187","scoring_system":"epss","scoring_elements":"0.89932","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05187","scoring_system":"epss","scoring_elements":"0.89927","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05187","scoring_system":"epss","scoring_elements":"0.89944","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05187","scoring_system":"epss","scoring_elements":"0.89943","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05187","scoring_system":"epss","scoring_elements":"0.89876","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10749"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10749","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10749"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/containernetworking/plugins","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/containernetworking/plugins"},{"reference_url":"https://github.com/containernetworking/plugins/releases/tag/v0.8.6","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/containernetworking/plugins/releases/tag/v0.8.6"},{"reference_url":"https://groups.google.com/forum/#!topic/kubernetes-security-announce/BMb_6ICCfp8","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://groups.google.com/forum/#!topic/kubernetes-security-announce/BMb_6ICCfp8"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DV3HCDZYUTPPVDUMTZXDKK6IUO3JMGJC","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DV3HCDZYUTPPVDUMTZXDKK6IUO3JMGJC"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10749","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10749"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1833220","reference_id":"1833220","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1833220"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2403","reference_id":"RHSA-2020:2403","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2403"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2412","reference_id":"RHSA-2020:2412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2443","reference_id":"RHSA-2020:2443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2592","reference_id":"RHSA-2020:2592","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2684","reference_id":"RHSA-2020:2684","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2684"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3194","reference_id":"RHSA-2020:3194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3194"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4694","reference_id":"RHSA-2020:4694","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4694"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5633","reference_id":"RHSA-2020:5633","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5633"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/529111?format=json","purl":"pkg:apk/alpine/k3s@1.18.3.1-r0?arch=armv7&distroversion=v3.15&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/k3s@1.18.3.1-r0%3Farch=armv7&distroversion=v3.15&reponame=community"}],"aliases":["CVE-2020-10749","GHSA-fx6x-h9g4-56f8"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-er95-u3yh-2ya9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/53108?format=json","vulnerability_id":"VCID-ny1b-eq77-fuhw","summary":"Server Side Request Forgery (SSRF) in Kubernetes\nThe Kubernetes kube-controller-manager in versions v1.0-1.14, versions prior to v1.15.12, v1.16.9, v1.17.5, and version v1.18.0 are vulnerable to a Server Side Request Forgery (SSRF) that allows certain authorized users to leak up to 500 bytes of arbitrary information from unprotected endpoints within the master's host network (such as link-local or loopback services).","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8555.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8555.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8555","reference_id":"","reference_type":"","scores":[{"value":"0.0861","scoring_system":"epss","scoring_elements":"0.92441","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0861","scoring_system":"epss","scoring_elements":"0.92446","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0861","scoring_system":"epss","scoring_elements":"0.92403","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0861","scoring_system":"epss","scoring_elements":"0.92432","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0861","scoring_system":"epss","scoring_elements":"0.92429","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0861","scoring_system":"epss","scoring_elements":"0.92423","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0861","scoring_system":"epss","scoring_elements":"0.92419","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0861","scoring_system":"epss","scoring_elements":"0.92389","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0861","scoring_system":"epss","scoring_elements":"0.92396","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0861","scoring_system":"epss","scoring_elements":"0.92407","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0861","scoring_system":"epss","scoring_elements":"0.92443","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0861","scoring_system":"epss","scoring_elements":"0.9244","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8555"},{"reference_url":"https://github.com/kubernetes/kubernetes/issues/91542","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/kubernetes/kubernetes/issues/91542"},{"reference_url":"https://github.com/kubernetes/kubernetes/pull/89794","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/kubernetes/kubernetes/pull/89794"},{"reference_url":"https://groups.google.com/d/topic/kubernetes-security-announce/kEK27tqqs30/discussion","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://groups.google.com/d/topic/kubernetes-security-announce/kEK27tqqs30/discussion"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8555","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8555"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200724-0005","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20200724-0005"},{"reference_url":"http://www.openwall.com/lists/oss-security/2020/06/01/4","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2020/06/01/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/05/04/8","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2021/05/04/8"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1821583","reference_id":"1821583","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1821583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2440","reference_id":"RHSA-2020:2440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2441","reference_id":"RHSA-2020:2441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2448","reference_id":"RHSA-2020:2448","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2448"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2449","reference_id":"RHSA-2020:2449","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2449"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2479","reference_id":"RHSA-2020:2479","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2479"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2594","reference_id":"RHSA-2020:2594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2594"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/529111?format=json","purl":"pkg:apk/alpine/k3s@1.18.3.1-r0?arch=armv7&distroversion=v3.15&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/k3s@1.18.3.1-r0%3Farch=armv7&distroversion=v3.15&reponame=community"}],"aliases":["CVE-2020-8555","GHSA-x6mj-w4jf-jmgw"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ny1b-eq77-fuhw"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/k3s@1.18.3.1-r0%3Farch=armv7&distroversion=v3.15&reponame=community"}