kiali vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kiali package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Authentication

<0:v1.24.7.redhat1-1.el8
  • H
Resource Exhaustion

<0:v1.24.7.redhat1-1.el8
  • H
Always-Incorrect Control Flow Implementation

<0:v1.24.7.redhat1-1.el8
  • H
Time-of-check Time-of-use (TOCTOU)

<0:v1.24.7.redhat1-1.el8
  • H
Use After Free

<0:v1.24.7.redhat1-1.el8
  • H
Use After Free

<0:v1.24.7.redhat1-1.el8
  • H
NULL Pointer Dereference

<0:v1.24.7.redhat1-1.el8
  • H
Resource Exhaustion

<0:v1.24.7.redhat1-1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:v1.24.7.redhat1-1.el8
  • H
Improper Validation of Array Index

<0:v1.24.7.redhat1-1.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:v1.24.7.redhat1-1.el8
  • H
Improper Input Validation

<0:v1.24.7.redhat1-1.el8
  • H
Race Condition

<0:v1.24.7.redhat1-1.el8
  • H
Improper Input Validation

<0:v1.24.7.redhat1-1.el8
  • M
Improper Certificate Validation

<0:v1.24.4.redhat2-1.el8
  • H
Improper Validation of Array Index

<0:v1.24.7.redhat1-1.el8
  • H
Improper Validation of Array Index

<0:v1.24.7.redhat1-1.el8