opendaylight vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the opendaylight package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Validation of Syntactic Correctness of Input

*
  • M
Improper Validation of Syntactic Correctness of Input

*
  • H
Arbitrary Code Injection

*
  • M
Resource Exhaustion

*
  • H
Incorrect Authorization

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • M
Resource Exhaustion

*
  • M
SQL Injection

*
  • M
Resource Exhaustion

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Resource Exhaustion

*
  • M
Race Condition

*
  • M
Resource Exhaustion

*
  • H
Deserialization of Untrusted Data

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • L
Authentication Bypass by Primary Weakness

*
  • L
Authentication Bypass by Primary Weakness

*
  • M
Improper Authorization

*
  • M
Resource Exhaustion

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
Authentication Bypass by Primary Weakness

*
  • L
Authentication Bypass by Primary Weakness

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
OS Command Injection

*
  • H
OS Command Injection

*
  • H
OS Command Injection

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • H
Authentication Bypass by Primary Weakness

*
  • H
Authentication Bypass by Primary Weakness

*
  • L
Use of Insufficiently Random Values

*
  • L
Use of Insufficiently Random Values

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Missing Authorization

*
  • M
Missing Authorization

*
  • M
Missing Authorization

*
  • M
Missing Authorization

*
  • M
Missing Authorization

*
  • M
LDAP Injection

*
  • M
LDAP Injection

*
  • M
LDAP Injection

*
  • M
LDAP Injection

*
  • M
LDAP Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • L
Improper Neutralization of Special Elements

*
  • L
Improper Neutralization of Special Elements

*
  • L
Improper Neutralization of Special Elements

*
  • L
Improper Neutralization of Special Elements

*
  • M
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • M
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • M
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Improper Neutralization of Special Elements

*
  • L
Improper Neutralization of Special Elements

*
  • L
Improper Neutralization of Special Elements

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • L
Improper Neutralization of Special Elements

*
  • L
Improper Neutralization of Special Elements

*
  • L
Improper Neutralization of Special Elements

*
  • L
Uncaught Exception

*
  • L
Uncaught Exception

*
  • L
Uncaught Exception

*
  • L
Uncaught Exception

*
  • M
Improper Initialization

*
  • M
Improper Initialization

*
  • M
Improper Initialization

*
  • M
Improper Initialization

*
  • M
Improper Initialization

*
  • M
Improper Initialization

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • M
Cleartext Transmission of Sensitive Information

*
  • M
Cleartext Transmission of Sensitive Information

*
  • M
Cleartext Transmission of Sensitive Information

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Improper Authentication

*
  • L
Improper Authentication

*
  • M
Improper Authentication

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • H
Information Exposure

*
  • H
Information Exposure

*
  • L
Incorrect Use of Privileged APIs

*
  • L
Incorrect Use of Privileged APIs

*
  • L
Incorrect Use of Privileged APIs

*
  • L
Incorrect Use of Privileged APIs

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • H
Deserialization of Untrusted Data

*
  • M
Unchecked Return Value

*
  • M
Incorrect Authorization

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • M
Improper Resource Shutdown or Release

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • M
Arbitrary Code Injection

*
  • L
Improper Input Validation

*
  • M
Insufficient Resource Pool

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • H
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Out-of-bounds Write

*
  • L
Incomplete Documentation of Program Execution

*
  • L
Incomplete Documentation of Program Execution

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • H
Deserialization of Untrusted Data

*
  • H
SQL Injection

*
  • M
Deserialization of Untrusted Data

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • C
Improper Input Validation

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • H
Incomplete Cleanup

*
  • H
Incomplete Cleanup

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • M
Information Exposure

*
  • L
Information Exposure

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • M
Incorrect Default Permissions

*
  • M
Incorrect Default Permissions

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Static Code Injection

*
  • M
Static Code Injection

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Static Code Injection

*
  • M
Static Code Injection

*
  • M
Static Code Injection

*
  • H
Static Code Injection

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
HTTP Request Smuggling

*
  • L
HTTP Request Smuggling

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • H
Improper Input Validation

*
  • H
Improper Input Validation

*
  • H
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • H
Missing Release of Resource after Effective Lifetime

*
  • H
Missing Release of Resource after Effective Lifetime

*
  • H
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • L
Directory Traversal

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Static Code Injection

*
  • M
Static Code Injection

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Static Code Injection

*
  • L
Static Code Injection

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • L
HTTP Request Smuggling

*
  • L
HTTP Request Smuggling

*
  • M
Information Exposure

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

<0:8.3.0-3.el7ost
  • M
Out-of-Bounds

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • L
Insufficient Session Expiration

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Incorrect Default Permissions

*
  • L
Incorrect Default Permissions

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • H
XML External Entity (XXE) Injection

*
  • L
XML External Entity (XXE) Injection

*
  • L
Static Code Injection

*
  • L
Static Code Injection

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • H
Resource Exhaustion

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
Static Code Injection

*
  • L
Static Code Injection

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*