Vulnerabilities > Helm
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-02-08 | CVE-2023-25165 | Information Exposure vulnerability in Helm Helm is a tool that streamlines installing and managing Kubernetes applications.`getHostByName` is a Helm template function introduced in Helm v3. | 4.3 |
2022-12-15 | CVE-2022-23524 | Allocation of Resources Without Limits or Throttling vulnerability in Helm Helm is a tool for managing Charts, pre-configured Kubernetes resources. | 7.5 |
2022-12-15 | CVE-2022-23525 | NULL Pointer Dereference vulnerability in Helm Helm is a tool for managing Charts, pre-configured Kubernetes resources. | 7.5 |
2022-12-15 | CVE-2022-23526 | NULL Pointer Dereference vulnerability in Helm Helm is a tool for managing Charts, pre-configured Kubernetes resources. | 7.5 |
2022-09-07 | CVE-2022-36049 | Allocation of Resources Without Limits or Throttling vulnerability in multiple products Flux2 is a tool for keeping Kubernetes clusters in sync with sources of configuration, and Flux's helm-controller is a Kubernetes operator that allows one to declaratively manage Helm chart releases. | 7.5 |
2022-09-01 | CVE-2022-36055 | Allocation of Resources Without Limits or Throttling vulnerability in Helm Helm is a tool for managing Charts. | 6.5 |
2021-06-16 | CVE-2021-32690 | Unspecified vulnerability in Helm Helm is a tool for managing Charts (packages of pre-configured Kubernetes resources). | 8.6 |
2021-02-05 | CVE-2021-21303 | Injection vulnerability in Helm Helm is open-source software which is essentially "The Kubernetes Package Manager". | 6.8 |
2020-09-17 | CVE-2020-15187 | Unspecified vulnerability in Helm In Helm before versions 2.16.11 and 3.3.2, a Helm plugin can contain duplicates of the same entry, with the last one always used. | 4.7 |
2020-09-17 | CVE-2020-15186 | Injection vulnerability in Helm In Helm before versions 2.16.11 and 3.3.2 plugin names are not sanitized properly. | 2.7 |