Vulnerabilities > Helm

DATE CVE VULNERABILITY TITLE RISK
2023-02-08 CVE-2023-25165 Information Exposure vulnerability in Helm
Helm is a tool that streamlines installing and managing Kubernetes applications.`getHostByName` is a Helm template function introduced in Helm v3.
network
low complexity
helm CWE-200
4.3
2022-12-15 CVE-2022-23524 Allocation of Resources Without Limits or Throttling vulnerability in Helm
Helm is a tool for managing Charts, pre-configured Kubernetes resources.
network
low complexity
helm CWE-770
7.5
2022-09-01 CVE-2022-36055 Allocation of Resources Without Limits or Throttling vulnerability in Helm
Helm is a tool for managing Charts.
network
low complexity
helm CWE-770
6.5
2021-06-16 CVE-2021-32690 Unspecified vulnerability in Helm
Helm is a tool for managing Charts (packages of pre-configured Kubernetes resources).
network
low complexity
helm
8.6
2021-02-05 CVE-2021-21303 Injection vulnerability in Helm
Helm is open-source software which is essentially "The Kubernetes Package Manager".
network
low complexity
helm CWE-74
6.8
2020-09-17 CVE-2020-15187 Unspecified vulnerability in Helm
In Helm before versions 2.16.11 and 3.3.2, a Helm plugin can contain duplicates of the same entry, with the last one always used.
network
low complexity
helm
6.5
2020-09-17 CVE-2020-15186 Injection vulnerability in Helm
In Helm before versions 2.16.11 and 3.3.2 plugin names are not sanitized properly.
network
low complexity
helm CWE-74
4.0
2020-09-17 CVE-2020-15185 Unspecified vulnerability in Helm
In Helm before versions 2.16.11 and 3.3.2, a Helm repository can contain duplicates of the same chart, with the last one always used.
network
low complexity
helm
4.0
2020-09-17 CVE-2020-15184 Injection vulnerability in Helm
In Helm before versions 2.16.11 and 3.3.2 there is a bug in which the `alias` field on a `Chart.yaml` is not properly sanitized.
network
low complexity
helm CWE-74
4.0
2020-06-16 CVE-2020-4053 Path Traversal vulnerability in Helm
In Helm greater than or equal to 3.0.0 and less than 3.2.4, a path traversal attack is possible when installing Helm plugins from a tar archive over HTTP.
network
low complexity
helm CWE-22
6.8