Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Kubernetes | Kubernetes | prior to 1.12.10 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | POC for CVE-2019-11248, remote code execution (RCE) | https://github.com/nop2nop/cve-2019-11248 | POC Details |
| 2 | POC for CVE-2019-11248, remote code execution (RCE) | https://github.com/masm3264/poc-CVE-2019-11248 | POC Details |
| 3 | None | https://github.com/nod3jzzz/poc-CVE-2019-11248 | POC Details |
| 4 | None | https://github.com/g1thubb001/poc-CVE-2019-11248 | POC Details |
| 5 | cve-2019-11248 cve-2020-1938 | https://github.com/bash3rt3am/poc-cve | POC Details |
| 6 | The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-11248.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet