atomic-openshift-service-idler vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the atomic-openshift-service-idler package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • H
Arbitrary Code Injection

<0:3.11.82-1.git.14.e353758.el7
  • H
Arbitrary Code Injection

<0:3.11.82-1.git.14.e353758.el7
  • H
Cross-site Scripting (XSS)

<0:3.11.82-1.git.14.e353758.el7
  • M
Improper Access Control

*
  • M
Information Exposure

<0:3.11.374-1.git.15.523a1f7.el7
  • H
Information Exposure

<0:3.11.51-1.git.14.813574a.el7
  • H
Session Fixation

<0:3.11.51-1.git.14.813574a.el7
  • H
Resource Exhaustion

<0:3.11.51-1.git.14.813574a.el7
  • H
Information Exposure

<0:3.11.51-1.git.14.813574a.el7
  • H
Static Code Injection

<0:3.11.82-1.git.14.e353758.el7
  • M
Link Following

<0:3.11.98-1.git.14.1793066.el7
  • H
Static Code Injection

<0:3.11.82-1.git.14.e353758.el7
  • H
Improper Authentication

<0:3.11.51-1.git.14.813574a.el7
  • H
Static Code Injection

<0:3.11.82-1.git.14.e353758.el7
  • H
Session Fixation

<0:3.11.82-1.git.14.e353758.el7
  • H
Session Fixation

<0:3.11.82-1.git.14.e353758.el7
  • H
Cross-site Scripting (XSS)

<0:3.11.117-1.git.1.887bb82.el7
  • H
Static Code Injection

<0:3.11.82-1.git.14.e353758.el7
  • H
Improper Authentication

<0:3.11.117-1.git.1.887bb82.el7
  • H
Improper Input Validation

<0:3.11.51-1.git.14.813574a.el7
  • H
Cross-site Scripting (XSS)

<0:3.11.51-1.git.14.813574a.el7
  • H
Directory Traversal

<0:3.11.51-1.git.14.813574a.el7
  • H
Authorization Bypass Through User-Controlled Key

*
  • H
Authorization Bypass Through User-Controlled Key

*
  • H
Static Code Injection

<0:3.11.82-1.git.14.e353758.el7
  • H
Cross-site Scripting (XSS)

<0:3.11.82-1.git.14.e353758.el7
  • H
Cross-site Scripting (XSS)

<0:3.11.82-1.git.14.e353758.el7
  • H
Cross-site Request Forgery (CSRF)

<0:3.11.82-1.git.14.e353758.el7
  • H
API Abuse

<0:3.11.170-1.git.1.8328979.el7
  • H
Information Exposure

<0:3.11.170-1.git.1.8328979.el7
  • H
Information Exposure

<0:3.11.170-1.git.1.8328979.el7
  • H
Covert Timing Channel

<0:3.11.170-1.git.1.8328979.el7
  • H
Covert Timing Channel

<0:3.11.170-1.git.1.8328979.el7
  • H
Insufficient Control of Network Message Volume (Network Amplification)

<0:3.11.170-1.git.1.8328979.el7
  • H
Authentication Bypass by Primary Weakness

<0:3.11.170-1.git.1.8328979.el7
  • H
OS Command Injection

<0:4.3.3-202002170501.git.1.4feff9c.el7
  • H
OS Command Injection

<0:4.2.20-202002170402.git.1.43218bc.el7
  • H
Incomplete Blacklist

<0:3.11.117-1.git.1.887bb82.el7
  • H
Insufficiently Protected Credentials

<0:3.11.117-1.git.1.887bb82.el7
  • M
Resource Exhaustion

<0:3.11.219-1.git.1.958cdae.el7
  • M
Resource Exhaustion

<0:4.3.9-202003230116.git.13.7ac3e5c.el7
  • M
Truncation of Security-relevant Information

<0:3.11.248-1.git.1.4c42a90.el7
  • M
Information Exposure

<0:3.11.248-1.git.1.4c42a90.el7
  • H
Cross-site Scripting (XSS)

<0:4.3.25-202006081518.git.1.79365c5.el7
  • H
Cross-site Scripting (XSS)

<0:4.4.0-202006080017.git.1.7e463c3.el7
  • H
Cross-site Scripting (XSS)

<0:4.4.0-202006080017.git.1.7e463c3.el7
  • H
Cross-site Scripting (XSS)

<0:4.3.25-202006081518.git.1.79365c5.el7
  • H
Cross-site Scripting (XSS)

<0:4.4.0-202006080017.git.1.7e463c3.el7
  • H
Cross-site Scripting (XSS)

<0:4.3.25-202006081518.git.1.79365c5.el7
  • H
Cross-site Request Forgery (CSRF)

<0:4.4.0-202006080017.git.1.7e463c3.el7
  • H
Cross-site Request Forgery (CSRF)

<0:4.3.25-202006081518.git.1.79365c5.el7
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Algorithmic Complexity

*
  • M
Algorithmic Complexity

*
  • M
Improper Input Validation

*
  • M
Use of Insufficiently Random Values

<0:3.11.374-1.git.15.523a1f7.el7
  • H
Out-of-bounds Read

<0:3.11.82-1.git.14.e353758.el7
  • H
Resource Exhaustion

<0:3.11.82-1.git.14.e353758.el7
  • H
Out-of-bounds Read

<0:3.11.82-1.git.14.e353758.el7
  • H
Heap-based Buffer Overflow

<0:4.3.3-202002170501.git.1.4feff9c.el7
  • L
NULL Pointer Dereference

*
  • M
HTTP Response Splitting

<0:3.11.374-1.git.15.523a1f7.el7
  • L
Race Condition

<0:4.5.0-202010081312.p0.git.15.d7814b2.el7
  • L
Race Condition

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.5.0-202010081312.p0.git.15.d7814b2.el7
  • H
Cross-site Scripting (XSS)

<0:3.11.170-1.git.1.8328979.el7
  • M
HTTP Request Smuggling

<0:4.2.4-201911041319.git.1.4131c2f.el7
  • M
HTTP Request Smuggling

*
  • H
Resource Exhaustion

<0:3.11.154-1.git.1.f80fb86.el7
  • H
Resource Exhaustion

<0:3.11.154-1.git.1.f80fb86.el7