openshift-elasticsearch-plugin vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the openshift-elasticsearch-plugin package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Information Exposure

<0:2.4.4.22__redhat_1-1.el7
  • L
Insufficiently Protected Credentials

*
  • L
Insufficiently Protected Credentials

*
  • L
Improper Authorization

*
  • L
Improper Authorization

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Improper Authorization

*
  • L
Improper Authorization

*
  • M
Improper Input Validation

<0:2.4.4.21__redhat_1-1.el7
  • M
Improper Authentication

<0:2.4.1.11__redhat_1-3.el7
  • M
Improper Authentication

<0:2.4.4.17__redhat_1-2.el7
  • M
Improper Authentication

<0:2.4.4.17__redhat_1-3.el7
  • M
Improper Authentication

<0:2.4.4.17__redhat_1-3.el7
  • M
Improper Authorization

<0:2.4.4.21__redhat_1-1.el7
  • M
Cross-site Scripting (XSS)

<0:0.16.0.redhat_1-1.el7
  • M
Cross-site Scripting (XSS)

<0:0.16.0.redhat_1-1.el7
  • M
Information Exposure Through Log Files

<0:0.16.0.redhat_1-1.el7
  • M
Information Exposure Through Log Files

<0:0.16.0.redhat_1-1.el7
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
Improper Input Validation

*
  • H
Improper Input Validation

*
  • H
Improper Input Validation

*
  • H
Improper Input Validation

*
  • H
Incomplete Blacklist

*
  • H
Incomplete Blacklist

*
  • H
Incomplete Blacklist

*
  • H
Incomplete Blacklist

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*
  • M
Deserialization of Untrusted Data

*