yunikorn-k8shim

Direct Vulnerabilities

Known vulnerabilities in the yunikorn-k8shim package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.8.0-r15
  • L
GHSA-mh2q-q3fh-2475

<1.8.0-r13
  • L
Allocation of Resources Without Limits or Throttling

<1.8.0-r13
  • L
GHSA-pjcq-xvwq-hhpj

<1.8.0-r12
  • L
Integer Overflow or Wraparound

<1.8.0-r12
  • L
GHSA-m4pr-4j3g-9v7v

<1.8.0-r11
  • H
Improper Certificate Validation

<1.8.0-r11
  • H
Allocation of Resources Without Limits or Throttling

<1.8.0-r11
  • L
CVE-2026-32280

<1.8.0-r11
  • L
GHSA-7mr4-xjxg-34g6

<1.8.0-r11
  • L
GHSA-gjvh-7jh8-7xhm

<1.8.0-r11
  • H
Incorrect Authorization

<1.8.0-r11
  • M
Cross-site Scripting (XSS)

<1.8.0-r11
  • L
GHSA-5w89-2c2x-6x66

<1.8.0-r11
  • L
GHSA-jrg3-gfjw-hm96

<1.8.0-r11
  • L
GHSA-p77j-4mvh-x3m3

<1.8.0-r8
  • L
Improper Authorization

<1.8.0-r8
  • L
GHSA-rv83-g57w-fr8j

<1.8.0-r7
  • L
Directory Traversal

<1.8.0-r7
  • L
Cross-site Scripting (XSS)

<1.8.0-r7
  • L
GHSA-j4j7-vw47-rhfq

<1.8.0-r7
  • L
Direct Request ('Forced Browsing')

<1.8.0-r7
  • L
GHSA-j3gx-2473-5fp8

<1.8.0-r7
  • C
CVE-2025-68121

<1.8.0-r1
  • L
GHSA-7wwx-xj66-r44x

<1.7.0-r5
  • L
GHSA-frhw-mqj2-wxw2

<1.7.0-r5
  • L
CVE-2024-45338

<1.6.0-r1
  • L
Improper Certificate Validation

<1.7.0-r5
  • L
CVE-2025-4563

<1.7.0-r1
  • L
Allocation of Resources Without Limits or Throttling

<1.7.0-r5
  • L
GHSA-3whm-j4xm-rv8x

<1.6.1-r1
  • L
CVE-2025-13281

<1.7.0-r7
  • L
CVE-2025-58186

<1.7.0-r5
  • L
GHSA-w32m-9786-jp63

<1.6.0-r1
  • L
CVE-2025-61732

<1.8.0-r1
  • L
Allocation of Resources Without Limits or Throttling

<1.7.0-r5
  • L
CVE-2025-61725

<1.7.0-r5
  • L
GHSA-cxq7-xw9v-rcv3

<1.7.0-r5
  • L
CVE-2025-0426

<1.6.1-r2
  • L
GHSA-8jvr-vh7g-f8gx

<1.8.0-r1
  • L
GHSA-jwmf-chvc-rf92

<1.7.0-r5
  • L
Race Condition

<1.7.0-r2
  • L
CVE-2025-22866

<1.6.1-r1
  • L
Information Exposure Through Log Files

<1.7.0-r5
  • L
GHSA-hj2p-8wj8-pfq4

<1.7.0-r1
  • L
GHSA-6f52-wpx2-hvf2

<1.6.3-r1
  • L
Allocation of Resources Without Limits or Throttling

<1.7.0-r5
  • L
GHSA-qh38-484v-w52x

<1.7.0-r5
  • L
GHSA-h355-32pf-p2xm

<1.8.0-r1
  • L
CVE-2025-22872

<1.6.2-r1
  • L
CVE-2025-5187

<1.7.0-r3
  • L
CVE-2025-61731

<1.7.0-r8
  • L
GHSA-j5pm-7495-qmr3

<1.7.0-r2
  • L
GHSA-qxp5-gwg8-xv66

<1.6.1-r4
  • L
GHSA-447v-2qg4-h8hc

<1.7.0-r5
  • L
GHSA-rjcg-56ph-3qvg

<1.7.0-r5
  • L
Out-of-bounds Write

<1.7.0-r8
  • L
CVE-2025-22868

<1.6.1-r3
  • L
CVE-2025-22874

<1.6.3-r1
  • L
GHSA-wcw9-47fp-rrfr

<1.7.0-r5
  • L
GHSA-62jj-gr2r-5c34

<1.6.3-r1
  • L
Allocation of Resources Without Limits or Throttling

<1.7.0-r8
  • L
GHSA-8pjc-487g-w6p2

<1.7.0-r4
  • L
CVE-2025-58183

<1.7.0-r5
  • L
GHSA-jgfp-53c3-624w

<1.6.1-r2
  • L
GHSA-4x4m-3c2p-qppc

<1.7.0-r3
  • L
GHSA-r6j8-c6r2-37rr

<1.7.0-r7
  • L
Algorithmic Complexity

<1.7.0-r5
  • L
CVE-2025-47910

<1.7.0-r4
  • L
GHSA-9gcr-gp5f-jw27

<1.7.0-r5
  • L
CVE-2025-4673

<1.6.3-r1
  • L
GHSA-gm9r-q53w-2gh4

<1.7.0-r8
  • L
CVE-2025-22870

<1.6.1-r4
  • L
GHSA-vvgc-356p-c3xw

<1.6.2-r1
  • L
GHSA-6v2p-p543-phr9

<1.6.1-r3
  • L
GHSA-cm6p-qc7v-m3jw

<1.7.0-r8
  • L
CVE-2025-61730

<1.7.0-r8
  • L
GHSA-gr56-3gp6-6gmj

<1.7.0-r8
  • L
GHSA-xvqr-69v8-f3gv

<1.7.0-r8
  • L
CVE-2025-47912

<1.7.0-r5
  • L
GHSA-hjx7-fpxx-mj48

<1.7.0-r5