teleport-18.6

Direct Vulnerabilities

Known vulnerabilities in the teleport-18.6 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-5m4p-2gjx-p2g8

<18.6.8-r14
  • L
GHSA-8g2r-hhvj-mv99

<18.6.8-r14
  • L
CVE-2026-42501

<18.6.8-r14
  • L
GHSA-497x-jcxf-m478

<18.6.8-r14
  • L
GHSA-qf3q-3h68-mmh2

<18.6.8-r14
  • H
Allocation of Resources Without Limits or Throttling

<18.6.8-r14
  • L
Cross-site Scripting (XSS)

<18.6.8-r14
  • M
Link Following

<18.6.8-r14
  • L
GHSA-p9h5-jm8x-mjm5

<18.6.8-r14
  • L
Improper Encoding or Escaping of Output

<18.6.8-r14
  • L
GHSA-2283-wf8c-rw8r

<18.6.8-r14
  • L
CVE-2026-42499

<18.6.8-r14
  • L
GHSA-xq5j-9r39-c3vf

<18.6.8-r14
  • H
Double Free

<18.6.8-r14
  • L
GHSA-qc64-m6c2-v4x7

<18.6.8-r14
  • M
Out-of-bounds Write

<18.6.8-r14
  • L
GHSA-3v2c-x6q9-f697

<18.6.8-r14
  • H
NULL Pointer Dereference

<18.6.8-r14
  • H
Insufficiently Protected Credentials

<18.6.8-r13
  • L
GHSA-3xc5-wrhm-f963

<18.6.8-r13
  • L
GHSA-pc3f-x583-g7j2

<18.6.8-r12
  • L
Allocation of Resources Without Limits or Throttling

<18.6.8-r12
  • L
GHSA-w8rr-5gcm-pp58

<18.6.8-r11
  • L
Uncontrolled Memory Allocation

<18.6.8-r11
  • H
Untrusted Search Path

<18.6.8-r10
  • L
GHSA-hfvc-g4fc-pqhx

<18.6.8-r10
  • L
GHSA-846p-jg2w-w324

<18.6.8-r9
  • L
GHSA-gm2x-2g9h-ccm8

<18.6.8-r9
  • L
GHSA-78h2-9frx-2jm8

<18.6.8-r9
  • M
Directory Traversal

<18.6.8-r9
  • L
Asymmetric Resource Consumption (Amplification)

<18.6.8-r9
  • L
GHSA-whqx-f9j3-ch6m

<18.6.8-r9
  • L
GHSA-4qg8-fj49-pxjh

<18.6.8-r9
  • L
Uncaught Exception

<18.6.8-r9
  • L
GHSA-jqc5-w2xx-5vq4

<18.6.8-r9
  • L
Improper Validation of Array Index

<18.6.8-r9
  • L
GHSA-4c4x-jm2x-pf9j

<18.6.8-r9
  • H
Improper Verification of Cryptographic Signature

<18.6.8-r9
  • L
GHSA-273p-m2cw-6833

<18.6.8-r9
  • M
Insufficient Verification of Data Authenticity

<18.6.8-r9
  • L
GHSA-jhf3-xxhw-2wpp

<18.6.8-r9
  • L
NULL Pointer Dereference

<18.6.8-r9
  • L
Integer Underflow

<18.6.8-r9
  • L
GHSA-fphv-w9fq-2525

<18.6.8-r9
  • H
Reachable Assertion

<18.6.8-r9
  • L
Server-Side Request Forgery (SSRF)

<18.6.8-r9
  • H
Improper Validation of Array Index

<18.6.8-r8
  • L
GHSA-x6gf-mpr2-68h6

<18.6.8-r8
  • L
Improper Validation of Array Index

<18.6.8-r7
  • L
Improper Verification of Cryptographic Signature

<18.6.8-r6
  • L
GHSA-hwqm-qvj9-4jr2

<18.6.8-r8
  • L
GHSA-pcgw-qcv5-h8ch

<18.6.8-r8
  • L
GHSA-479m-364c-43vc

<18.6.8-r6
  • L
GHSA-6g7g-w4f8-9c9x

<18.6.8-r7
  • L
GHSA-p77j-4mvh-x3m3

<18.6.8-r5
  • L
Improper Authorization

<18.6.8-r5
  • L
GHSA-37cx-329c-33x3

<18.6.8-r4
  • M
Improper Validation of Integrity Check Value

<18.6.8-r4
  • H
CVE-2025-15558

<18.6.8-r3
  • L
GHSA-p436-gjf2-799p

<18.6.8-r3
  • L
Untrusted Search Path

<18.6.8-r2
  • L
GHSA-9h8m-3fm2-qjrq

<18.6.8-r2