opendaylight.src vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the opendaylight.src package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Static Code Injection

*
  • H
XML External Entity (XXE) Injection

*
  • L
Deserialization of Untrusted Data

*
  • L
Static Code Injection

*
  • M
Improper Validation of Syntactic Correctness of Input

*
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • H
Static Code Injection

*
  • H
Deserialization of Untrusted Data

*
  • H
Static Code Injection

*
  • M
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Static Code Injection

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • M
SQL Injection

*
  • L
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • M
Static Code Injection

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • L
Creation of Temporary File in Directory with Incorrect Permissions

*
  • M
Improper Authorization

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • M
Improper Input Validation

*
  • L
Static Code Injection

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • L
Deserialization of Untrusted Data

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
Information Exposure

*
  • M
XML External Entity (XXE) Injection

*
  • L
HTTP Request Smuggling

*
  • L
Authentication Bypass by Primary Weakness

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Arbitrary Code Injection

*
  • M
Information Exposure

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
HTTP Request Smuggling

*
  • M
Resource Exhaustion

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
XML External Entity (XXE) Injection

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Resource Exhaustion

*