atomic-openshift vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the atomic-openshift package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • L
Placement of User into Incorrect Group

*
  • M
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • M
Resource Exhaustion

*
  • M
Truncation of Security-relevant Information

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • M
Improper Access Control

*
  • L
Improper Handling of Length Parameter Inconsistency

*
  • M
Cross-site Scripting (XSS)

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Information Exposure

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Algorithmic Complexity

*
  • M
Improper Input Validation

*
  • M
Out-of-bounds Read

*
  • M
Improper Validation of Integrity Check Value

*
  • M
Resource Exhaustion

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Race Condition

*
  • L
Placement of User into Incorrect Group

*
  • M
Improper Validation of Array Index

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Directory Traversal

*
  • L
Incorrect Authorization

*
  • M
Incorrect Default Permissions

*
  • L
Resource Exhaustion

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Race Condition

*
  • M
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • L
Incorrect Authorization

*
  • L
Resource Exhaustion

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Open Redirect

*
  • M
Insufficiently Protected Credentials

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Insufficiently Protected Credentials

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Improper Access Control

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Authentication

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Link Following

*
  • M
Authentication Bypass by Primary Weakness

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Use of Insufficiently Random Values

*
  • M
Improper Output Neutralization for Logs

*
  • M
Information Exposure

*
  • M
Improper Authentication

*
  • M
Improper Input Validation

*
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Write

*
  • M
Improper Output Neutralization for Logs

*
  • M
Improper Input Validation

*
  • M
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • M
Directory Traversal

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Buffer Overflow

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
Incorrect Calculation

*
  • M
Authentication Bypass

*
  • M
CVE-2023-2728

*
  • M
CVE-2023-2727

*
  • M
Authentication Bypass by Primary Weakness

*
  • M
Cleartext Storage of Sensitive Information

*
  • L
OS Command Injection

*
  • H
Authorization Bypass Through User-Controlled Key

*
  • M
Path Equivalence

*