openshift vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the openshift package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • L
Improper Verification of Cryptographic Signature

*
  • M
CVE-2024-9042

*
  • L
Improper Handling of Exceptional Conditions

*
  • M
Use of Uninitialized Variable

*
  • M
Use of Uninitialized Variable

*
  • M
Improper Input Validation

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Information Exposure

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • M
Improper Input Validation

*
  • M
Arbitrary Code Injection

*
  • M
Misinterpretation of Input

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
Incorrect Authorization

*
  • M
Resource Exhaustion

*
  • M
HTTP Response Splitting

*
  • M
CVE-2023-2727

*
  • M
CVE-2023-2728

*
  • M
Improper Handling of Unicode Encoding

*
  • M
Improper Handling of Unicode Encoding

*
  • M
Incorrect Default Permissions

*
  • M
Authentication Bypass by Primary Weakness

*
  • L
Incorrect Authorization

*
  • L
Arbitrary Code Injection

*
  • M
Insecure Default Variable Initialization

*
  • M
Authentication Bypass

*
  • L
Improper Restriction of Rendered UI Layers or Frames

*
  • L
Improper Initialization

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Directory Traversal

*
  • H
Authorization Bypass Through User-Controlled Key

*
  • M
Improper Certificate Validation

*
  • L
Improper Preservation of Permissions

*
  • L
Improper Input Validation

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • L
Improper Access Control

*
  • M
Improper Input Validation

*
  • M
Insufficiently Protected Credentials

*
  • L
Placement of User into Incorrect Group

*
  • M
File and Directory Information Exposure

*
  • M
Algorithmic Complexity

*
  • M
Directory Traversal

*
  • L
Resource Exhaustion

*
  • M
Information Exposure

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
HTTP Request Smuggling

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Resource Exhaustion

*
  • M
Race Condition

*
  • M
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*