helm vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the helm package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Reachable Assertion

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
CVE-2025-4673

*
  • H
Asymmetric Resource Consumption (Amplification)

*
  • H
Resource Exhaustion

*
  • M
Placement of User into Incorrect Group

*
  • M
Placement of User into Incorrect Group

*
  • L
Improper Verification of Cryptographic Signature

*
  • L
Improper Verification of Cryptographic Signature

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • H
Insufficient Entropy

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • L
Improper Handling of Exceptional Conditions

*
  • L
Insufficient Entropy

*
  • L
Insufficient Entropy

*
  • M
Improper Input Validation

*
  • M
Buffer Overflow

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • L
Resource Exhaustion

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Buffer Access with Incorrect Length Value

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Improper Handling of Unicode Encoding

*
  • M
Cross-site Scripting (XSS)

*
  • M
HTTP Response Splitting

*
  • M
Directory Traversal

*
  • M
Improper Handling of Unicode Encoding

*
  • M
Resource Exhaustion

*
  • M
Arbitrary Code Injection

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Information Exposure

*
  • M
CVE-2022-41715

*
  • M
Resource Exhaustion

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
HTTP Request Smuggling

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
HTTP Request Smuggling

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
HTTP Request Smuggling

*
  • M
Resource Exhaustion

*
  • M
Arbitrary Code Injection

*
  • H
Improper Handling of Unicode Encoding

*
  • M
Use of Uninitialized Variable

*
  • M
Use of Uninitialized Variable

*
  • H
Arbitrary Argument Injection

*
  • H
Memory Leak

*
  • H
Memory Leak

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Misinterpretation of Input

*
  • M
NULL Pointer Dereference

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
Arbitrary Code Injection

*
  • M
CVE-2020-15187

*
  • L
CVE-2020-15185

*
  • L
Resource Exhaustion

*
  • H
Authorization Bypass Through User-Controlled Key

*