servicemesh-pilot-discovery vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the servicemesh-pilot-discovery package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Open Redirect

<0:1.1.6-1.el8
  • C
Improperly Implemented Security Check for Standard

<0:1.0.3-1.el8
  • C
Improper Access Control

<0:1.0.3-1.el8
  • C
Incorrect Calculation of Buffer Size

<0:1.0.3-1.el8
  • M
Information Exposure

*
  • M
Information Exposure

*
  • H
Incorrect Authorization

<0:1.1.14-1.el8
  • H
Incorrect Authorization

<0:2.0.4-1.el8
  • H
Incorrect Authorization

<0:2.0.4-1.el8
  • H
Incorrect Authorization

<0:1.1.14-1.el8
  • H
NULL Pointer Dereference

<0:1.1.13-3.el8
  • H
NULL Pointer Dereference

<0:1.1.13-3.el8
  • H
Integer Overflow or Wraparound

<0:1.1.13-3.el8
  • H
Improper Validation of Array Index

<0:1.1.13-3.el8
  • H
Resource Exhaustion

<0:1.1.0-5.el8
  • H
Incorrect Regular Expression

<0:1.1.0-5.el8
  • H
Incorrect Authorization

<0:1.1.15-4.el8
  • H
Incorrect Authorization

<0:2.0.5-3.el8
  • M
Improper Access Control

<0:1.1.7-1.el8
  • H
Incorrect Authorization

<0:2.0.7-3.el8
  • H
Incorrect Authorization

<0:1.1.17-3.el8
  • H
Incorrect Authorization

<0:1.1.17-3.el8
  • H
Incorrect Authorization

<0:2.0.7-3.el8
  • H
NULL Pointer Dereference

<0:1.1.17-3.el8
  • H
NULL Pointer Dereference

<0:2.0.7-3.el8
  • H
Incorrect Authorization

<0:1.1.17-3.el8
  • H
Incorrect Authorization

<0:2.0.7-3.el8
  • H
Incorrect Authorization

<0:1.1.17-3.el8
  • H
Incorrect Authorization

<0:2.0.7-3.el8
  • H
Insufficient Entropy

<0:2.1.6-1.el8
  • M
Out-of-bounds Read

*
  • C
Out-of-bounds Read

<0:2.1.3-1.el8
  • C
Reachable Assertion

<0:2.1.3-1.el8
  • C
Incorrect Implementation of Authentication Algorithm

<0:2.1.3-1.el8
  • C
Improper Handling of Highly Compressed Data (Data Amplification)

<0:2.1.3-1.el8
  • C
NULL Pointer Dereference

<0:2.1.3-1.el8
  • H
Improper Authentication

<0:2.0.9-3.el8
  • H
Improper Authentication

<0:2.1.2-4.el8
  • H
Resource Exhaustion

<0:2.0.9-3.el8
  • H
Resource Exhaustion

<0:2.1.2-4.el8
  • H
Always-Incorrect Control Flow Implementation

<0:2.1.2-4.el8
  • H
Always-Incorrect Control Flow Implementation

<0:2.0.9-3.el8
  • H
Time-of-check Time-of-use (TOCTOU)

<0:2.0.9-3.el8
  • H
Time-of-check Time-of-use (TOCTOU)

<0:2.1.2-4.el8
  • H
Use After Free

<0:2.1.2-4.el8
  • H
Use After Free

<0:2.0.9-3.el8
  • H
Use After Free

<0:2.0.9-3.el8
  • H
Use After Free

<0:2.1.2-4.el8
  • H
NULL Pointer Dereference

<0:2.1.2-4.el8
  • H
NULL Pointer Dereference

<0:2.0.9-3.el8
  • H
Resource Exhaustion

<0:2.0.9-3.el8
  • M
Improper Access Control

*
  • M
Improper Access Control

*
  • M
Resource Exhaustion

*
  • H
Allocation of Resources Without Limits or Throttling

<0:2.0.9-3.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:2.1.2-4.el8
  • M
Incorrect Authorization

*
  • M
Incorrect Authorization

*
  • M
Incorrect Authorization

*
  • M
Always-Incorrect Control Flow Implementation

*
  • M
Always-Incorrect Control Flow Implementation

*
  • M
Always-Incorrect Control Flow Implementation

*
  • M
NULL Pointer Dereference

*
  • H
Resource Exhaustion

<0:2.1.0-5.el8
  • M
Directory Traversal

*
  • H
Improper Validation of Array Index

<0:2.0.9-3.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.0.9-3.el8
  • M
Improper Input Validation

<0:1.1.6-1.el8
  • H
Resource Exhaustion

<0:1.0.2-3.el8
  • M
Resource Exhaustion

*
  • M
HTTP Request Smuggling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Resource Exhaustion

<0:2.1.5-1.el8
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Insufficient Entropy

*
  • M
Insufficient Entropy

<0:2.1.5-1.el8
  • M
Improper Privilege Management

<0:2.1.5-1.el8
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

<0:2.1.5-1.el8
  • M
Buffer Overflow

*
  • M
Buffer Overflow

<0:2.1.5-1.el8
  • M
Directory Traversal

<0:2.1.5-1.el8
  • M
Missing Release of Resource after Effective Lifetime

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Resource Exhaustion

<0:2.1.5-1.el8
  • M
Resource Exhaustion

*
  • C
Unchecked Return Value

<0:2.1.3-1.el8
  • C
Incorrect Authorization

<0:2.1.3-1.el8
  • M
Incorrect Authorization

*
  • C
Integer Overflow or Wraparound

<0:2.1.3-1.el8
  • M
Integer Overflow or Wraparound

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • H
Race Condition

<0:2.0.9-3.el8
  • H
Improper Input Validation

<0:2.0.9-3.el8
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.1.6-1.el8
  • M
Incorrect Calculation

*
  • M
Incorrect Calculation

*
  • M
Incorrect Calculation

*
  • M
Cross-site Scripting (XSS)

<0:1.1.6-1.el8
  • H
NULL Pointer Dereference

*
  • M
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • L
Race Condition

<0:1.1.11-2.el8
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.1.11-2.el8
  • H
Resource Exhaustion

<0:1.0.1-8.el8
  • H
Resource Exhaustion

<0:1.0.1-8.el8
  • M
Resource Exhaustion

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Improper Input Validation

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Improper Handling of Length Parameter Inconsistency

<0:1.1.6-1.el8
  • H
Improper Validation of Array Index

<0:2.0.9-3.el8
  • H
Improper Validation of Array Index

<0:2.0.9-3.el8