microshift-ai-model-serving vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the microshift-ai-model-serving package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
NULL Pointer Dereference

*
  • H
Improper Validation of Syntactic Correctness of Input

*
  • H
Improper Certificate Validation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
CVE-2025-68121

*
  • M
Resource Exhaustion

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Certificate Validation

*
  • M
Out-of-bounds Read

*
  • H
Excessive Platform Resource Consumption within a Loop

*
  • L
CVE-2025-58186

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Resource Exhaustion

*
  • M
Missing Reference to Active Allocated Resource

*
  • H
Incorrect Execution-Assigned Permissions

*
  • M
Reachable Assertion

*
  • H
Reachable Assertion

*
  • M
Creation of Immutable Text Using String Concatenation

*
  • M
Missing Authentication for Critical Function

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Information Exposure

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
CVE-2025-4673

*
  • L
Incorrect Authorization

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • M
Use of Uninitialized Variable

*
  • L
Improper Handling of Exceptional Conditions

*
  • H
Improper Validation of Syntactic Correctness of Input

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Information Exposure

*
  • H
Asymmetric Resource Consumption (Amplification)

*
  • L
Incorrect Authorization

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Input Validation

*
  • L
Improper Verification of Cryptographic Signature

*