servicemesh-prometheus vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the servicemesh-prometheus package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Placement of User into Incorrect Group

*
  • M
Resource Exhaustion

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • L
Insufficient Entropy

*
  • M
Buffer Overflow

*
  • M
Integer Overflow or Wraparound

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Improper Access Control

*
  • M
Resource Exhaustion

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • H
Exposure of Private Information ('Privacy Violation')

*
  • H
Exposure of Private Information ('Privacy Violation')

*
  • L
Incorrect Regular Expression

*
  • L
Incorrect Regular Expression

*
  • L
Resource Exhaustion

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Resource Exhaustion

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Exposure of Private Information ('Privacy Violation')

*
  • M
Improper Input Validation

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • H
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • H
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • M
Information Exposure

*
  • M
Improper Verification of Cryptographic Signature

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Improper Verification of Cryptographic Signature

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Directory Traversal

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • M
Improper Verification of Cryptographic Signature

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Open Redirect

*
  • M
Resource Exhaustion

*
  • M
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • M
Resource Exhaustion

*
  • M
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • M
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • H
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • M
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Resource Exhaustion

*
  • M
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • H
Improper Validation of Array Index

*
  • M
OS Command Injection

*
  • M
Arbitrary Code Injection

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Arbitrary Code Injection

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Resource Exhaustion

*
  • M
Improper Handling of Insufficient Permissions or Privileges

*
  • M
Missing Authorization

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
Improper Input Validation

*
  • M
Buffer Overflow

*
  • M
Improper Input Validation

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Authorization Bypass Through User-Controlled Key

*
  • H
Authorization Bypass Through User-Controlled Key

*
  • H
Authorization Bypass Through User-Controlled Key

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Incorrect Calculation

*
  • M
Incorrect Calculation

*