kots-compat vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kots-compat package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Directory Traversal

<1.128.3-r0
  • L
CVE-2025-58181

<1.128.3-r2
  • L
CVE-2025-22870

<1.124.6-r0
  • L
GHSA-5xqw-8hwv-wg92

<1.124.14-r1
  • L
Allocation of Resources Without Limits or Throttling

<1.124.14-r1
  • L
GHSA-j5w8-q4qc-rx2x

<1.128.3-r2
  • L
GHSA-xfhp-jf8p-mh5w

<1.109.14-r1
  • L
GHSA-v23v-6jw2-98fq

<1.112.2-r1
  • L
GHSA-qxp5-gwg8-xv66

<1.124.6-r0
  • L
GHSA-92cp-5422-2mw7

<1.124.8-r2
  • L
CVE-2024-41110

<1.112.2-r1
  • L
Directory Traversal

<1.128.3-r0
  • L
Improper Input Validation

<1.124.8-r2
  • L
Asymmetric Resource Consumption (Amplification)

<1.124.8-r1
  • L
GHSA-33c5-9fx5-fvjm

<1.124.8-r0
  • L
GHSA-4hfp-h4cw-hj8p

<1.124.14-r1
  • L
Improper Handling of Exceptional Conditions

<1.124.8-r0
  • L
GHSA-cgrx-mc8f-2prm

<1.128.3-r1
  • M
Memory Leak

<1.128.3-r1
  • L
GHSA-v725-9546-7q7m

<1.123.0-r1
  • L
GHSA-6v2p-p543-phr9

<1.124.5-r1
  • L
CVE-2025-22868

<1.124.5-r1
  • L
GHSA-r9px-m959-cxf4

<1.123.0-r1
  • L
GHSA-j5vm-7qcc-2wwg

<1.123.1-r0
  • L
GHSA-mh63-6h87-95cp

<1.124.8-r1
  • L
GHSA-7c64-f9jr-v9h2

<1.129.1-r0
  • L
GHSA-9h84-qmv7-982p

<1.126.0-r0
  • L
CVE-2025-47914

<1.128.3-r2
  • L
CVE-2024-28180

<1.128.3-r0
  • L
Improper Certificate Validation

<1.129.1-r0
  • L
CVE-2025-22872

<1.124.15-r1
  • H
CVE-2024-6257

<1.109.14-r1
  • L
CVE-2024-45337

<1.122.0-r0
  • L
Stack-based Buffer Overflow

<1.124.14-r1
  • L
GHSA-7vpp-9cxj-q8gv

<1.128.3-r0
  • L
GHSA-557j-xg8c-q2mm

<1.124.18-r2
  • L
GHSA-v778-237x-gjrc

<1.122.0-r0
  • L
Use of Uninitialized Resource

<1.126.0-r0
  • H
Arbitrary Code Injection

<1.124.18-r2
  • L
GHSA-xr7r-f8xq-vfvv

<1.107.0-r1
  • H
Exposure of Resource to Wrong Sphere

<1.107.0-r1
  • H
Use of Uninitialized Resource

<1.107.7-r0
  • L
GHSA-f6x5-jh6r-wrfv

<1.128.3-r2
  • L
GHSA-29wx-vh33-7x7r

<1.124.8-r0
  • L
GHSA-r53h-jv2g-vpx6

<1.107.7-r0
  • L
Allocation of Resources Without Limits or Throttling

<1.124.4-r1
  • M
Open Redirect

<1.124.8-r0
  • L
GHSA-6m8w-jc87-6cr7

<1.124.16-r1
  • M
CVE-2025-11579

<1.128.2-r1
  • L
GHSA-rwvp-r38j-9rgg

<1.128.2-r1
  • L
GHSA-c77r-fh37-x2px

<1.117.2-r1
  • L
GHSA-vvgc-356p-c3xw

<1.124.15-r1
  • L
GHSA-wjrx-6529-hcj3

<1.126.0-r1
  • L
Allocation of Resources Without Limits or Throttling

<1.126.0-r0
  • L
CVE-2025-22869

<1.124.5-r2
  • H
Symlink Following

<1.128.3-r1
  • L
GHSA-f9f8-9pmf-xv68

<1.126.0-r0
  • L
GHSA-pwhc-rpq9-4c8w

<1.128.3-r1
  • L
GHSA-hcg3-q754-cr77

<1.124.5-r2
  • L
GHSA-c6gw-w398-hv78

<1.124.4-r1
  • L
GHSA-m6hq-p25p-ffr2

<1.128.3-r1
  • L
GHSA-c5q2-7r4c-mv6g

<1.128.3-r0
  • L
Arbitrary Code Injection

<1.124.16-r1
  • L
GHSA-phw4-mc57-4hwc

<1.124.3-r1
  • L
CVE-2025-8959

<1.126.0-r1
  • L
GHSA-m7wr-2xf7-cm9p

<1.108.1-r0
  • L
Asymmetric Resource Consumption (Amplification)

<1.129.1-r1
  • L
Race Condition

<1.125.2-r1
  • L
CVE-2024-27289

<1.108.1-r0
  • L
GHSA-265r-hfxg-fhmg

<1.124.7-r1
  • L
GHSA-j5pm-7495-qmr3

<1.125.2-r1
  • L
Authorization Bypass Through User-Controlled Key

<1.124.3-r1
  • H
Incorrect Execution-Assigned Permissions

<1.128.3-r1
  • L
Arbitrary Argument Injection

<1.123.0-r1
  • L
GHSA-2x5j-vhc8-9cwm

<1.124.17-r1
  • L
CVE-2024-45338

<1.122.0-r1
  • H
Authentication Bypass

<1.117.2-r1
  • L
Resource Exhaustion

<1.123.0-r1
  • M
Directory Traversal

<1.107.4-r0
  • L
GHSA-fv92-fjc5-jj9h

<1.124.18-r1
  • L
GHSA-xr7q-jx4m-x55m

<1.111.0-r1
  • L
GHSA-w32m-9786-jp63

<1.122.0-r1
  • L
GHSA-rhh4-rh7c-7r5v

<1.128.3-r0
  • L
GHSA-f83f-xpx7-ffpw

<1.129.1-r1
  • L
GHSA-v53g-5gjp-272r

<1.107.4-r0
  • H
Integer Overflow or Wraparound

<1.124.7-r1
  • L
Improper Validation of Specified Type of Input

<1.124.17-r1