{"uuid": "b7bdd6fb-ee32-4e05-956a-d7ec43bf9329", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-11254", "type": "seen", "source": "https://t.me/cibsecurity/10919", "content": "ATENTION\u203c New - CVE-2019-11254\n\nThe Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-04-02T00:28:23.000000Z"}