atomic-enterprise-service-catalog-svcat vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the atomic-enterprise-service-catalog-svcat package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • L
Information Exposure

<1:3.10.14-1.git.1444.3b95d24.el7
  • H
Arbitrary Code Injection

<1:3.11.82-1.git.1673.133961e.el7
  • H
Arbitrary Code Injection

<1:3.11.82-1.git.1673.133961e.el7
  • C
Authentication Bypass by Primary Weakness

<1:3.10.72-1.git.1450.7d3f435.el7
  • H
Cross-site Scripting (XSS)

<1:3.11.82-1.git.1673.133961e.el7
  • M
Information Exposure

<1:3.11.374-1.git.1675.738abcc.el7
  • H
Information Exposure

<1:3.11.51-1.git.1671.2d16650.el7
  • H
Session Fixation

<1:3.11.51-1.git.1671.2d16650.el7
  • H
Resource Exhaustion

<1:3.11.51-1.git.1671.2d16650.el7
  • H
Information Exposure

<1:3.11.51-1.git.1671.2d16650.el7
  • H
Static Code Injection

<1:3.11.82-1.git.1673.133961e.el7
  • M
Link Following

<1:3.10.127-1.git.55.b54f8c7.el7
  • M
Link Following

<1:3.11.98-1.git.0.a7877b0.el7
  • H
Static Code Injection

<1:3.11.82-1.git.1673.133961e.el7
  • H
Improper Authentication

<1:3.11.51-1.git.1671.2d16650.el7
  • H
Static Code Injection

<1:3.11.82-1.git.1673.133961e.el7
  • H
Session Fixation

<1:3.11.82-1.git.1673.133961e.el7
  • H
Session Fixation

<1:3.11.82-1.git.1673.133961e.el7
  • H
Cross-site Scripting (XSS)

<1:3.11.117-1.git.1.376e432.el7
  • H
Static Code Injection

<1:3.11.82-1.git.1673.133961e.el7
  • H
Improper Authentication

<1:3.11.117-1.git.1.376e432.el7
  • H
Improper Input Validation

<1:3.11.51-1.git.1671.2d16650.el7
  • H
Cross-site Scripting (XSS)

<1:3.11.51-1.git.1671.2d16650.el7
  • H
Directory Traversal

<1:3.11.51-1.git.1671.2d16650.el7
  • H
Authorization Bypass Through User-Controlled Key

*
  • H
Static Code Injection

<1:3.11.82-1.git.1673.133961e.el7
  • H
Cross-site Scripting (XSS)

<1:3.11.82-1.git.1673.133961e.el7
  • H
Cross-site Scripting (XSS)

<1:3.11.82-1.git.1673.133961e.el7
  • H
Cross-site Request Forgery (CSRF)

<1:3.11.82-1.git.1673.133961e.el7
  • M
Directory Traversal

<1:4.1.16-201909090609.git.1.cc4acc1.el7
  • H
API Abuse

<1:3.11.170-1.git.1.91db82e.el7
  • H
Information Exposure

<1:3.11.170-1.git.1.91db82e.el7
  • H
Information Exposure

<1:3.11.170-1.git.1.91db82e.el7
  • H
Covert Timing Channel

<1:3.11.170-1.git.1.91db82e.el7
  • H
Covert Timing Channel

<1:3.11.170-1.git.1.91db82e.el7
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<1:3.11.170-1.git.1.91db82e.el7
  • H
Authentication Bypass by Primary Weakness

<1:3.11.170-1.git.1.91db82e.el7
  • H
OS Command Injection

<1:4.3.3-202002170501.git.1.f30799e.el7
  • H
OS Command Injection

<1:4.2.20-202002170402.git.1.159e2f5.el7
  • H
OS Command Injection

<1:4.1.37-202003020601.git.0.5784dc4.el7
  • H
Incomplete Blacklist

<1:3.11.117-1.git.1.376e432.el7
  • H
Insufficiently Protected Credentials

<1:3.11.117-1.git.1.376e432.el7
  • M
Resource Exhaustion

<1:3.11.219-1.git.1.717017c.el7
  • M
Resource Exhaustion

<1:4.3.9-202003230116.git.0.57d5c98.el7
  • M
Truncation of Security-relevant Information

<1:3.11.248-1.git.1.9aad2ef.el7
  • M
Information Exposure

<1:3.11.248-1.git.1.9aad2ef.el7
  • H
Cross-site Scripting (XSS)

<1:4.4.0-202006080017.git.1.77a5cc9.el7
  • H
Cross-site Scripting (XSS)

<1:4.3.25-202006081518.git.1.52b3a66.el7
  • H
Cross-site Scripting (XSS)

<1:4.3.25-202006081518.git.1.52b3a66.el7
  • H
Cross-site Scripting (XSS)

<1:4.4.0-202006080017.git.1.77a5cc9.el7
  • H
Cross-site Scripting (XSS)

<1:4.3.25-202006081518.git.1.52b3a66.el7
  • H
Cross-site Scripting (XSS)

<1:4.4.0-202006080017.git.1.77a5cc9.el7
  • H
Cross-site Request Forgery (CSRF)

<1:4.3.25-202006081518.git.1.52b3a66.el7
  • H
Cross-site Request Forgery (CSRF)

<1:4.4.0-202006080017.git.1.77a5cc9.el7
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Algorithmic Complexity

*
  • M
Improper Input Validation

*
  • M
Use of Insufficiently Random Values

<1:3.11.374-1.git.1675.738abcc.el7
  • H
Out-of-bounds Read

<1:3.11.82-1.git.1673.133961e.el7
  • H
Resource Exhaustion

<1:3.11.82-1.git.1673.133961e.el7
  • H
Out-of-bounds Read

<1:3.11.82-1.git.1673.133961e.el7
  • H
Heap-based Buffer Overflow

<1:4.3.3-202002170501.git.1.f30799e.el7
  • M
HTTP Response Splitting

<1:3.11.374-1.git.1675.738abcc.el7
  • L
Race Condition

*
  • L
Race Condition

<1:4.5.0-202010081312.p0.git.1808.498e523.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:4.5.0-202010081312.p0.git.1808.498e523.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Cross-site Scripting (XSS)

<1:3.11.170-1.git.1.91db82e.el7
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

<1:4.2.4-201911041319.git.1.1de4bcd.el7
  • H
Resource Exhaustion

<1:4.1.14-201908290858.git.1.28cc9ff.el7
  • H
Resource Exhaustion

<1:3.11.154-1.git.1.fa68ced.el7
  • H
Resource Exhaustion

<1:3.11.154-1.git.1.fa68ced.el7
  • H
Resource Exhaustion

<1:4.1.14-201908290858.git.1.28cc9ff.el7