openshift4/ose-console

Direct Vulnerabilities

Known vulnerabilities in the openshift4/ose-console package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Reliance on Untrusted Inputs in a Security Decision

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
Improper Validation of Specified Quantity in Input

*
  • H
Arbitrary Code Injection

*
  • H
Incorrect Privilege Assignment

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Unchecked Input for Loop Condition

*
  • H
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Executable Regular Expression Error

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Unchecked Input for Loop Condition

*
  • H
Incorrect Behavior Order: Authorization Before Parsing and Canonicalization

*
  • H
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • H
Improper Validation of Specified Type of Input

*
  • M
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Improper Validation of Integrity Check Value

*
  • M
Cross-site Scripting (XSS)

*
  • M
Deserialization of Untrusted Data

*
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Cross-site Scripting (XSS)

*
  • M
Use of a Risky Cryptographic Primitive

*
  • M
Open Redirect

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Excessive Platform Resource Consumption within a Loop

*
  • L
CVE-2025-58186

*
  • M
Out-of-bounds Read

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Resource Exhaustion

*
  • M
Missing Reference to Active Allocated Resource

*
  • H
Reachable Assertion

*
  • M
Reachable Assertion

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Use of Uninitialized Resource

*
  • L
Link Following

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • L
Improper Validation of Specified Type of Input

*
  • M
Missing Initialization of Resource

*
  • L
Missing Initialization of Resource

*
  • M
Use of Insufficiently Random Values

*
  • H
Arbitrary Code Injection

*
  • H
Improper Input Validation

*
  • H
Improper Input Validation

*