An authenticated remote attacker can exploit multiple vulnerabilities in Kyverno to disclose information, bypass security measures, manipulate data, and gain elevated privileges. [Auto-archived: reprocess_no_remaining_articles — 2026-04-16T12:11:35.631Z]
| Vendor | Product | Versions |
|---|---|---|
| — | kyverno | — |