openshift4/ose-console-rhel9

Direct Vulnerabilities

Known vulnerabilities in the openshift4/ose-console-rhel9 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
Improper Validation of Specified Quantity in Input

*
  • H
Arbitrary Code Injection

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Unchecked Input for Loop Condition

*
  • H
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Executable Regular Expression Error

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Unchecked Input for Loop Condition

*
  • H
Incorrect Behavior Order: Authorization Before Parsing and Canonicalization

*
  • H
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • H
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

*
  • H
Inefficient Regular Expression Complexity

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • H
Improper Validation of Specified Type of Input

*
  • M
Incorrect Behavior Order: Early Validation

*
  • M
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Resource Exhaustion

*
  • M
Directory Traversal

*
  • M
Improper Input Validation

*
  • M
Cross-site Scripting (XSS)

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Directory Traversal

*
  • M
Improper Validation of Integrity Check Value

*
  • M
Cross-site Scripting (XSS)

*
  • H
Link Following

*
  • M
Deserialization of Untrusted Data

*
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Time-of-check Time-of-use (TOCTOU)

*
  • H
Directory Traversal

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • H
Cross-site Scripting (XSS)

*
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • M
Use of a Risky Cryptographic Primitive

*
  • M
Open Redirect

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Excessive Platform Resource Consumption within a Loop

*
  • L
CVE-2025-58186

*
  • M
Out-of-bounds Read

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Improper Verification of Cryptographic Signature

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Resource Exhaustion

*
  • H
Incorrect Behavior Order: Early Validation

*
  • M
Missing Reference to Active Allocated Resource

*
  • M
Integer Overflow or Wraparound

*
  • H
Reachable Assertion

*
  • M
Uncontrolled Recursion

*
  • M
Resource Exhaustion

*
  • M
Reachable Assertion

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • H
Directory Traversal

*
  • L
Server-Side Request Forgery (SSRF)

*
  • L
Directory Traversal

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Use of Uninitialized Resource

*
  • L
Link Following

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • L
Improper Validation of Specified Type of Input

*
  • M
Missing Initialization of Resource

*
  • L
Missing Initialization of Resource

*
  • M
Use of Insufficiently Random Values

*
  • H
Arbitrary Code Injection

*
  • H
Improper Input Validation

*
  • H
Improper Input Validation

*