openshift4/oc-mirror-plugin-rhel9

Direct Vulnerabilities

Known vulnerabilities in the openshift4/oc-mirror-plugin-rhel9 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Buffer Overflow

*
  • M
SQL Injection

*
  • H
Out-of-bounds Read

*
  • H
Integer Overflow or Wraparound

*
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

*
  • H
Unchecked Input for Loop Condition

*
  • H
Integer Overflow or Wraparound

*
  • H
Out-of-bounds Read

*
  • H
Improper Certificate Validation

*
  • M
Authentication Bypass

*
  • M
Directory Traversal

*
  • H
Improper Validation of Specified Index, Position, or Offset in Input

*
  • M
Missing Authentication for Critical Function

*
  • M
Directory Traversal

*
  • M
Reliance on Untrusted Inputs in a Security Decision

*
  • M
Authentication Bypass

*
  • H
Information Exposure

*
  • M
Authentication Bypass

*
  • H
Information Exposure

*
  • M
Authorization Bypass Through User-Controlled Key

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Insufficient Granularity of Access Control

*
  • H
Direct Request ('Forced Browsing')

*
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • H
Improper Validation of Syntactic Correctness of Input

*
  • H
Improper Validation of Syntactic Correctness of Input

*
  • H
Improper Validation of Array Index

*
  • L
Exposure of Data Element to Wrong Session

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
Access of Uninitialized Pointer

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Information Exposure Through Log Files

*
  • M
Directory Traversal

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
NULL Pointer Dereference

*
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Authentication Bypass

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Validation of Syntactic Correctness of Input

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Uncontrolled Memory Allocation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Use of Uninitialized Resource

*
  • H
Arbitrary Code Injection

*
  • L
Improper Input Validation

*