atomic-openshift-pod vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the atomic-openshift-pod package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Authentication Bypass

*
  • L
Placement of User into Incorrect Group

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • L
Incorrect Authorization

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • M
CVE-2023-2728

*
  • M
CVE-2023-2727

*
  • M
Directory Traversal

*
  • M
Authentication Bypass

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Improper Output Neutralization for Logs

*
  • M
Improper Output Neutralization for Logs

*
  • M
Open Redirect

*
  • M
Improper Authentication

*
  • M
Improper Input Validation

*
  • M
Insufficiently Protected Credentials

*
  • M
Cleartext Storage of Sensitive Information

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Insufficiently Protected Credentials

*
  • M
Use of Insufficiently Random Values

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Link Following

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Information Exposure Through Log Files

*
  • M
Resource Exhaustion

*
  • M
Information Exposure Through Log Files

*
  • M
Resource Exhaustion

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authorization

*
  • M
Improper Authorization

*
  • M
Improper Input Validation

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Improper Access Control

*
  • M
Improper Input Validation

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
Improper Authentication

*
  • M
Authentication Bypass by Primary Weakness

*
  • H
Authorization Bypass Through User-Controlled Key

*
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Write

*
  • L
OS Command Injection

*
  • L
Placement of User into Incorrect Group

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • M
Resource Exhaustion

*
  • M
Authentication Bypass by Primary Weakness

*
  • M
Path Equivalence

*
  • M
Incorrect Default Permissions

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Directory Traversal

*
  • L
NULL Pointer Dereference

*
  • H
Resource Exhaustion

*
  • M
Truncation of Security-relevant Information

*
  • M
Resource Exhaustion

*
  • M
Algorithmic Complexity

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • M
Out-of-bounds Read

*
  • M
Improper Input Validation

*
  • M
Race Condition

*
  • L
Resource Exhaustion

*
  • L
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • L
Buffer Overflow

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Incorrect Calculation

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Improper Access Control

*
  • M
Resource Exhaustion

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Race Condition

*
  • M
HTTP Request Smuggling

*
  • M
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • H
Resource Exhaustion

*
  • M
Improper Validation of Array Index

*
  • M
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • L
Improper Handling of Length Parameter Inconsistency

*