opendaylight vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the opendaylight package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • C
Improper Input Validation

*
  • M
Out-of-bounds Write

*
  • M
Unchecked Return Value

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Resource Exhaustion

*
  • H
Information Exposure

*
  • H
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
Insufficient Session Expiration

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improper Validation of Syntactic Correctness of Input

*
  • M
Improper Validation of Syntactic Correctness of Input

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • L
Information Exposure

*
  • M
Improper Input Validation

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
XML External Entity (XXE) Injection

*
  • M
Information Exposure

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Cleartext Transmission of Sensitive Information

*
  • M
Cleartext Transmission of Sensitive Information

*
  • M
Cleartext Transmission of Sensitive Information

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • L
XML External Entity (XXE) Injection

*
  • H
XML External Entity (XXE) Injection

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • M
Static Code Injection

*
  • H
Static Code Injection

*
  • M
Static Code Injection

*
  • H
Static Code Injection

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • M
Static Code Injection

*
  • H
Static Code Injection

*
  • L
Static Code Injection

*
  • L
Static Code Injection

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • L
Static Code Injection

*
  • L
Static Code Injection

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • M
Static Code Injection

*
  • M
Static Code Injection

*
  • L
Deserialization of Untrusted Data

*
  • L
Static Code Injection

*
  • L
Deserialization of Untrusted Data

*
  • L
Static Code Injection

*
  • L
Static Code Injection

*
  • L
Static Code Injection

*
  • L
Static Code Injection

*
  • L
Static Code Injection

*
  • H
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • L
Use of Insufficiently Random Values

*
  • L
Use of Insufficiently Random Values

*
  • M
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • M
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • M
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • L
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • H
Deserialization of Untrusted Data

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Arbitrary Code Injection

*
  • M
Improper Resource Shutdown or Release

*
  • M
Deserialization of Untrusted Data

*
  • M
Insufficient Granularity of Access Control

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Insufficient Resource Pool

*
  • M
Improper Input Validation

*
  • M
Race Condition

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Server-Side Request Forgery (SSRF)

*
  • H
Incorrect Authorization

*
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • H
Deserialization of Untrusted Data

*
  • H
SQL Injection

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Resource Exhaustion

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Incorrect Use of Privileged APIs

*
  • L
Incorrect Use of Privileged APIs

*
  • L
Incorrect Use of Privileged APIs

*
  • L
Incorrect Use of Privileged APIs

*
  • L
Incorrect Use of Privileged APIs

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • L
Improper Neutralization of Special Elements

*
  • L
Improper Neutralization of Special Elements

*
  • L
Improper Neutralization of Special Elements

*
  • L
Improper Neutralization of Special Elements

*
  • L
Improper Neutralization of Special Elements

*
  • L
Improper Neutralization of Special Elements

*
  • L
Improper Neutralization of Special Elements

*
  • L
Improper Neutralization of Special Elements

*
  • L
Improper Neutralization of Special Elements

*
  • L
Uncaught Exception

*
  • L
Uncaught Exception

*
  • L
Uncaught Exception

*
  • L
Uncaught Exception

*
  • L
Uncaught Exception

*
  • L
Improper Neutralization of Special Elements

*
  • L
Improper Neutralization of Special Elements

*
  • L
Improper Neutralization of Special Elements

*
  • L
Improper Neutralization of Special Elements

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • M
Improper Initialization

*
  • M
Improper Initialization

*
  • M
Improper Initialization

*
  • M
Improper Initialization

*
  • M
Improper Initialization

*
  • M
Improper Initialization

*
  • M
Improper Initialization

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Missing Authorization

*
  • M
Missing Authorization

*
  • M
Missing Authorization

*
  • M
Missing Authorization

*
  • M
Missing Authorization

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • H
Arbitrary Code Injection

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • L
Authentication Bypass by Primary Weakness

*
  • L
Authentication Bypass by Primary Weakness

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
Authentication Bypass by Primary Weakness

*
  • H
Authentication Bypass by Primary Weakness

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • L
Directory Traversal

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • M
LDAP Injection

*
  • M
LDAP Injection

*
  • M
LDAP Injection

*
  • M
LDAP Injection

*
  • M
LDAP Injection

*
  • M
LDAP Injection

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • L
Authentication Bypass by Primary Weakness

*
  • L
Authentication Bypass by Primary Weakness

*
  • M
Use After Free

*
  • M
Use After Free

*
  • H
Improper Input Validation

*
  • H
Improper Input Validation

*
  • H
Improper Input Validation

*
  • H
Improper Input Validation

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • H
Resource Exhaustion

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • L
HTTP Request Smuggling

*
  • L
HTTP Request Smuggling

*
  • M
Improper Authorization

*
  • M
Incorrect Default Permissions

*
  • M
Incorrect Default Permissions

*
  • H
Missing Release of Resource after Effective Lifetime

*
  • H
Missing Release of Resource after Effective Lifetime

*
  • H
Incomplete Cleanup

*
  • H
Incomplete Cleanup

*
  • L
HTTP Request Smuggling

*
  • L
HTTP Request Smuggling

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • L
Incomplete Documentation of Program Execution

*
  • L
Incomplete Documentation of Program Execution

*
  • L
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*