openshift

Direct Vulnerabilities

Known vulnerabilities in the openshift package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Resource Exhaustion

*
  • M
Excessive Platform Resource Consumption within a Loop

*
  • M
Cross-site Scripting (XSS)

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Out-of-bounds Read

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
Improper Validation of Specified Quantity in Input

*
  • H
Incorrect Behavior Order: Authorization Before Parsing and Canonicalization

*
  • M
Missing Reference to Active Allocated Resource

*
  • M
Improper Validation of Integrity Check Value

*
  • H
Improper Certificate Validation

*
  • H
Improper Validation of Syntactic Correctness of Input

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
CVE-2025-68121

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Creation of Immutable Text Using String Concatenation

*
  • M
Improper Certificate Validation

*
  • M
Directory Traversal

*
  • M
Expected Behavior Violation

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
CVE-2025-4673

*
  • M
Resource Exhaustion

*
  • L
Placement of User into Incorrect Group

*
  • L
Improper Verification of Cryptographic Signature

*
  • M
Information Exposure

*
  • M
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • L
Incorrect Authorization

*
  • L
Incorrect Authorization

*
  • M
Cross-site Scripting (XSS)

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Truncation of Security-relevant Information

*
  • M
Improper Input Validation

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • L
Improper Handling of Exceptional Conditions

*
  • L
Insufficient Entropy

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Information Exposure

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Resource Exhaustion

*
  • M
Buffer Access with Incorrect Length Value

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Resource Exhaustion

*
  • L
NULL Pointer Dereference

*
  • M
Use of Uninitialized Variable

*
  • M
Resource Exhaustion

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Algorithmic Complexity

*
  • M
Unchecked Return Value

*
  • C
Authentication Bypass by Primary Weakness

*
  • M
Incorrect Default Permissions

*
  • L
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • M
Incorrect Privilege Assignment

*
  • L
Missing Authorization

*
  • L
Resource Exhaustion

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Out-of-bounds Write

*
  • L
Improper Preservation of Permissions

*