openshift.src vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the openshift.src package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Information Exposure

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Resource Exhaustion

*
  • L
Improper Access Control

*
  • M
Insufficiently Protected Credentials

*
  • M
OS Command Injection

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • L
Arbitrary Code Injection

*
  • L
Improper Preservation of Permissions

*
  • M
Improper Certificate Validation

*
  • L
Incorrect Authorization

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
OS Command Injection

*
  • L
Race Condition

*
  • L
NULL Pointer Dereference

*
  • M
Insecure Default Variable Initialization

*
  • L
Improper Restriction of Rendered UI Layers or Frames

*
  • L
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • L
Insufficient Entropy

*
  • M
Truncation of Security-relevant Information

*
  • M
Incorrect Default Permissions

*
  • H
Information Exposure

*
  • M
Use of Uninitialized Variable

*
  • M
Algorithmic Complexity

*
  • L
Resource Exhaustion

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • L
Incorrect Authorization

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Improper Handling of Exceptional Conditions

*
  • M
Improper Input Validation

*
  • M
CVE-2025-4673

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • L
OS Command Injection

*
  • H
Authorization Bypass Through User-Controlled Key

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • M
Cross-site Scripting (XSS)

*
  • M
Unchecked Return Value

*
  • M
Use After Free

*
  • L
Incorrect Authorization

*
  • L
Incorrect Authorization

*
  • M
Buffer Access with Incorrect Length Value

*
  • L
Placement of User into Incorrect Group

*
  • M
Insufficient Granularity of Access Control

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • L
Improper Verification of Cryptographic Signature

*
  • M
Improper Handling of Highly Compressed Data (Data Amplification)

*