openshift vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the openshift package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Placement of User into Incorrect Group

*
  • L
Improper Verification of Cryptographic Signature

*
  • M
Information Exposure

*
  • M
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • L
Incorrect Authorization

*
  • L
Incorrect Authorization

*
  • M
Cross-site Scripting (XSS)

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Truncation of Security-relevant Information

*
  • M
Improper Input Validation

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • L
Improper Handling of Exceptional Conditions

*
  • L
Insufficient Entropy

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Information Exposure

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Resource Exhaustion

*
  • M
CVE-2023-39321

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
HTTP Request Smuggling

*
  • M
Resource Exhaustion

*
  • L
NULL Pointer Dereference

*
  • M
Use of Uninitialized Variable

*
  • M
Resource Exhaustion

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • L
Race Condition

*
  • M
Algorithmic Complexity

*
  • M
Unchecked Return Value

*
  • M
OS Command Injection

*
  • C
Authentication Bypass by Primary Weakness

*
  • L
Improper Access Control

*
  • L
Arbitrary Code Injection

*
  • L
Incorrect Authorization

*
  • M
Incorrect Default Permissions

*
  • L
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • M
Insufficient Granularity of Access Control

*
  • L
Improper Restriction of Rendered UI Layers or Frames

*
  • L
Missing Authorization

*
  • L
Resource Exhaustion

*
  • M
Insecure Default Variable Initialization

*
  • M
Improper Certificate Validation

*
  • M
Insufficiently Protected Credentials

*
  • M
OS Command Injection

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Out-of-bounds Write

*
  • M
Use After Free

*
  • L
Improper Preservation of Permissions

*
  • L
OS Command Injection

*
  • H
Authorization Bypass Through User-Controlled Key

*