openshift-service-mesh/pilot-rhel8

Direct Vulnerabilities

Known vulnerabilities in the openshift-service-mesh/pilot-rhel8 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Information Exposure

*
  • L
Authentication Bypass by Primary Weakness

*
  • L
Improper Certificate Validation

*
  • L
Information Exposure

*
  • M
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • L
Improperly Implemented Security Check for Standard

*
  • L
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • L
Information Exposure

*
  • L
Authentication Bypass by Primary Weakness

*
  • L
Improperly Implemented Security Check for Standard

*
  • L
Improperly Implemented Security Check for Standard

*
  • L
Improper Certificate Validation

*
  • L
Authentication Bypass by Primary Weakness

*
  • L
Improperly Implemented Security Check for Standard

*
  • L
Improper Certificate Validation

*
  • L
Information Exposure

*
  • L
Authentication Bypass by Primary Weakness

*
  • M
Improper Certificate Validation

*
  • L
Improperly Implemented Security Check for Standard

*
  • L
Improper Certificate Validation

*
  • L
Information Exposure

*
  • M
Improper Certificate Validation

*
  • L
Authentication Bypass by Primary Weakness

*
  • H
Incorrect Calculation of Buffer Size

*
  • H
Incorrect Calculation of Buffer Size

*
  • H
Incorrect Calculation of Buffer Size

*
  • H
Incorrect Calculation of Buffer Size

*
  • H
Incorrect Calculation of Buffer Size

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • H
Incorrect Behavior Order: Authorization Before Parsing and Canonicalization

*
  • H
Incorrect Behavior Order: Authorization Before Parsing and Canonicalization

*
  • H
Incorrect Behavior Order: Authorization Before Parsing and Canonicalization

*
  • H
Incorrect Behavior Order: Authorization Before Parsing and Canonicalization

*
  • H
Incorrect Behavior Order: Authorization Before Parsing and Canonicalization

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
CVE-2026-31837

*
  • M
Incorrect Behavior Order: Authorization Before Parsing and Canonicalization

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
CVE-2026-31837

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Incorrect Behavior Order: Authorization Before Parsing and Canonicalization

*
  • M
Incorrect Behavior Order: Authorization Before Parsing and Canonicalization

*
  • H
CVE-2026-31837

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Incorrect Behavior Order: Authorization Before Parsing and Canonicalization

*
  • H
CVE-2026-31837

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Incorrect Behavior Order: Authorization Before Parsing and Canonicalization

*
  • H
CVE-2026-31837

*
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Creation of Temporary File in Directory with Incorrect Permissions

*
  • H
Directory Traversal

*
  • M
Creation of Temporary File in Directory with Incorrect Permissions

*
  • M
Creation of Temporary File in Directory with Incorrect Permissions

*
  • M
Creation of Temporary File in Directory with Incorrect Permissions

*
  • M
Creation of Temporary File in Directory with Incorrect Permissions

*
  • H
Directory Traversal

*
  • H
Directory Traversal

*
  • H
Directory Traversal

*
  • H
Directory Traversal

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Deserialization of Untrusted Data

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • M
CVE-2026-0858

*
  • M
CVE-2026-0858

*
  • M
CVE-2026-0858

*
  • M
CVE-2026-0858

*
  • M
CVE-2026-0858

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • M
Link Following

*
  • M
Incomplete Blacklist

*
  • M
Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element

*
  • M
Incomplete Blacklist

*
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • M
Link Following

*
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • M
Incomplete Blacklist

*
  • M
Link Following

*
  • M
Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element

*
  • M
Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element

*
  • M
Link Following

*
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • M
Incomplete Blacklist

*
  • M
Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element

*
  • M
Link Following

*
  • M
Incomplete Blacklist

*
  • M
Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
HTTP Request Smuggling

*
  • L
Logging of Excessive Data

*
  • M
HTTP Request Smuggling

*
  • L
Logging of Excessive Data

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Directory Traversal

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Directory Traversal

*
  • M
HTTP Request Smuggling

*
  • L
Logging of Excessive Data

*
  • L
Logging of Excessive Data

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
HTTP Request Smuggling

*
  • M
Directory Traversal

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Directory Traversal

*
  • M
HTTP Request Smuggling

*
  • L
Logging of Excessive Data

*
  • L
HTTP Request Smuggling

*
  • M
Directory Traversal

*
  • L
HTTP Request Smuggling

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
HTTP Request Smuggling

*
  • L
HTTP Request Smuggling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
HTTP Request Smuggling

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • L
Inefficient Regular Expression Complexity

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
Inefficient Regular Expression Complexity

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • H
Excessive Platform Resource Consumption within a Loop

*
  • H
Excessive Platform Resource Consumption within a Loop

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
CVE-2025-58186

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
SQL Injection

*
  • L
Inefficient Regular Expression Complexity

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
Inefficient Regular Expression Complexity

*
  • L
CVE-2025-58186

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Protection Mechanism Failure

*
  • L
CVE-2025-58186

*
  • M
SQL Injection

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Protection Mechanism Failure

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
SQL Injection

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Protection Mechanism Failure

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
CVE-2025-58186

*
  • M
SQL Injection

*
  • M
Protection Mechanism Failure

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Protection Mechanism Failure

*
  • H
Excessive Platform Resource Consumption within a Loop

*
  • L
Inefficient Regular Expression Complexity

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Excessive Platform Resource Consumption within a Loop

*
  • M
SQL Injection

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • L
CVE-2025-58186

*
  • H
Excessive Platform Resource Consumption within a Loop

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Missing Reference to Active Allocated Resource

*
  • M
Missing Reference to Active Allocated Resource

*
  • M
Missing Reference to Active Allocated Resource

*
  • M
Missing Reference to Active Allocated Resource

*
  • M
Missing Reference to Active Allocated Resource

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Uncaught Exception

*
  • M
Uncaught Exception

*
  • M
Uncaught Exception

*
  • M
Uncaught Exception

*
  • M
Uncaught Exception

*
  • M
Reachable Assertion

*
  • M
Reachable Assertion

*
  • M
Reachable Assertion

*
  • M
Reachable Assertion

*
  • M
Reachable Assertion

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

*
  • M
Improper Output Neutralization for Logs

*
  • M
Improper Output Neutralization for Logs

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

*
  • M
Improper Output Neutralization for Logs

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Expired Pointer Dereference

*
  • M
Expired Pointer Dereference

*
  • M
Expired Pointer Dereference

*
  • M
Expired Pointer Dereference

*
  • M
Expired Pointer Dereference

*
  • M
Reachable Assertion

*
  • M
Reachable Assertion

*
  • M
Reachable Assertion

*
  • M
Reachable Assertion

*
  • M
Reachable Assertion

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Use of Uninitialized Resource

*
  • M
Use of Uninitialized Resource

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Use of Uninitialized Resource

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Use of Uninitialized Resource

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Use of Uninitialized Resource

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Time-of-check Time-of-use (TOCTOU)

*