kyverno-fips-cleanup-controller-1.13

Direct Vulnerabilities

Known vulnerabilities in the kyverno-fips-cleanup-controller-1.13 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Reachable Assertion

*
  • L
Integer Overflow or Wraparound

*
  • L
GHSA-3xc5-wrhm-f963

*
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<1.13.6-r7
  • C
CVE-2026-27143

<1.13.6-r7
  • L
GHSA-f9g8-6ppc-pqq4

*
  • L
GHSA-8wfp-579w-6r25

*
  • L
GHSA-cvq5-hhx3-f99p

*
  • L
Insecure Storage of Sensitive Information

*
  • L
GHSA-fmqp-4wfc-w3v7

*
  • L
GHSA-qr4g-8hrp-c4rw

*
  • M
Allocation of Resources Without Limits or Throttling

<1.13.6-r7
  • H
Improper Certificate Validation

<1.13.6-r7
  • L
CVE-2026-32280

<1.13.6-r7
  • M
Cross-site Scripting (XSS)

<1.13.6-r7
  • H
Incorrect Authorization

<1.13.6-r7
  • M
Link Following

<1.13.6-r7
  • H
Improper Certificate Validation

<1.13.6-r7
  • H
Allocation of Resources Without Limits or Throttling

<1.13.6-r7
  • H
Untrusted Search Path

*
  • L
Uncaught Exception

*
  • L
Integer Underflow

*
  • L
Improper Validation of Array Index

*
  • L
Improper Authorization

*
  • L
Cross-site Scripting (XSS)

*
  • L
Improper Certificate Validation

*
  • L
Directory Traversal

*
  • L
Direct Request ('Forced Browsing')

*
  • L
Improper Certificate Validation

*
  • H
CVE-2025-15558

*
  • L
Untrusted Search Path

*
  • C
CVE-2026-1229

*
  • L
Improper Initialization

*
  • M
Improper Validation of Integrity Check Value

*
  • C
CVE-2025-68121

*
  • L
CVE-2025-61732

*
  • L
CVE-2025-61730

<1.13.6-r2
  • L
CVE-2025-61731

<1.13.6-r2
  • L
Out-of-bounds Write

<1.13.6-r2
  • L
Allocation of Resources Without Limits or Throttling

<1.13.6-r2
  • L
Allocation of Resources Without Limits or Throttling

<1.13.6-r2
  • L
Improper Privilege Management

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Directory Traversal

*
  • L
NULL Pointer Dereference

*
  • L
Directory Traversal

*
  • L
Server-Side Request Forgery (SSRF)

*
  • H
Reachable Assertion

*
  • H
Improper Verification of Cryptographic Signature

*
  • M
Insufficient Verification of Data Authenticity

*
  • M
Server-Side Request Forgery (SSRF)

*
  • L
Improper Input Validation

*
  • L
Asymmetric Resource Consumption (Amplification)

*
  • H
Improper Authorization

*
  • L
CVE-2025-47914

*
  • L
CVE-2025-58181

*
  • L
Asymmetric Resource Consumption (Amplification)

*
  • L
Allocation of Resources Without Limits or Throttling

*