servicemesh-proxy vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the servicemesh-proxy package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
NULL Pointer Dereference

*
  • H
Resource Exhaustion

*
  • H
Incorrect Check of Function Return Value

*
  • M
Resource Exhaustion

*
  • M
Uncaught Exception

*
  • M
HTTP Request Smuggling

*
  • H
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Use After Free

*
  • M
Resource Exhaustion

*
  • H
Improper Input Validation

*
  • M
Inefficient CPU Computation

*
  • H
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
HTTP Request Smuggling

*
  • M
Resource Exhaustion

*
  • M
HTTP Request Smuggling

*
  • M
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
HTTP Request Smuggling

*
  • H
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • M
HTTP Request Smuggling

*
  • H
Incorrect Check of Function Return Value

*
  • H
Incorrect Check of Function Return Value

*
  • H
Incorrect Check of Function Return Value

*
  • H
Incorrect Check of Function Return Value

*
  • H
Improper Input Validation

*
  • M
Inefficient CPU Computation

*
  • M
Uncaught Exception

*
  • M
Use After Free

*
  • M
Use After Free

*
  • H
NULL Pointer Dereference

*
  • H
NULL Pointer Dereference

*
  • M
Inefficient CPU Computation

*
  • M
Uncaught Exception

*
  • H
Improper Input Validation

*
  • H
NULL Pointer Dereference

*
  • M
Uncaught Exception

*
  • H
Improper Input Validation

*
  • M
Use After Free

*
  • M
Uncaught Exception

*
  • H
Improper Input Validation

*
  • H
NULL Pointer Dereference

*
  • M
Inefficient CPU Computation

*
  • M
Inefficient CPU Computation

*
  • M
Use After Free

*
  • H
CVE-2023-27488

*
  • H
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • H
HTTP Request Smuggling

*
  • M
CVE-2023-27496

*
  • C
Improperly Implemented Security Check for Standard

<0:1.0.3-1.el8
  • C
Improper Access Control

<0:1.0.3-1.el8
  • C
Incorrect Calculation of Buffer Size

<0:1.0.3-1.el8
  • M
Improper Access Control

<0:1.0.9-2.el8
  • M
Resource Exhaustion

<0:1.0.9-2.el8
  • M
Improperly Implemented Security Check for Standard

<0:1.0.9-2.el8
  • M
Resource Exhaustion

<0:1.0.9-2.el8
  • H
Incorrect Authorization

<0:1.1.14-1.el8
  • H
Incorrect Authorization

<0:2.0.4-1.el8
  • H
Incorrect Authorization

<0:1.1.14-1.el8
  • H
Incorrect Authorization

<0:2.0.4-1.el8
  • H
NULL Pointer Dereference

<0:2.0.3-1.el8
  • H
NULL Pointer Dereference

<0:1.1.13-1.el8
  • H
NULL Pointer Dereference

<0:1.1.13-1.el8
  • H
NULL Pointer Dereference

<0:2.0.3-1.el8
  • H
Integer Overflow or Wraparound

<0:1.1.13-1.el8
  • H
Integer Overflow or Wraparound

<0:2.0.3-1.el8
  • H
Improper Validation of Array Index

<0:1.1.13-1.el8
  • H
NULL Pointer Dereference

<0:1.1.2-2.el8
  • H
Improper Authorization

<0:1.0.7-1.el8
  • M
Improper Access Control

<0:1.1.9-1.el8
  • H
Resource Exhaustion

<0:1.1.0-4.el8
  • H
Incorrect Regular Expression

<0:1.1.0-4.el8
  • H
Resource Exhaustion

<0:1.1.4-2.el8
  • H
Resource Exhaustion

<0:1.0.11-1.el8
  • H
Resource Exhaustion

<0:1.1.4-2.el8
  • H
Resource Exhaustion

<0:1.0.11-1.el8
  • H
Resource Exhaustion

<0:1.1.4-2.el8
  • H
Resource Exhaustion

<0:1.0.11-1.el8
  • H
Resource Exhaustion

<0:1.0.11-1.el8
  • H
Resource Exhaustion

<0:1.1.4-2.el8
  • H
Incorrect Authorization

<0:1.1.17-2.el8
  • H
Incorrect Authorization

<0:2.0.7-3.el8
  • H
Incorrect Authorization

<0:1.1.17-2.el8
  • H
Incorrect Authorization

<0:2.0.7-3.el8
  • H
NULL Pointer Dereference

<0:1.1.17-2.el8
  • H
NULL Pointer Dereference

<0:2.0.7-3.el8
  • H
Incorrect Authorization

<0:2.0.7-3.el8
  • H
Incorrect Authorization

<0:1.1.17-2.el8
  • H
Incorrect Authorization

<0:1.1.17-2.el8
  • H
Incorrect Authorization

<0:2.0.7-3.el8
  • H
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Improper Validation of Certificate with Host Mismatch

<0:1.1.5-1.el8
  • C
Out-of-bounds Read

<0:2.1.3-1.el8
  • H
Reachable Assertion

*
  • C
Reachable Assertion

<0:2.1.3-1.el8
  • C
Incorrect Implementation of Authentication Algorithm

<0:2.1.3-1.el8
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

<0:2.0.10-1.el8
  • C
Improper Handling of Highly Compressed Data (Data Amplification)

<0:2.1.3-1.el8
  • H
NULL Pointer Dereference

<0:2.0.10-1.el8
  • C
NULL Pointer Dereference

<0:2.1.3-1.el8
  • H
Improper Authentication

<0:2.1.2-4.el8
  • H
Improper Authentication

<0:2.0.9-3.el8
  • H
Resource Exhaustion

<0:2.0.9-3.el8
  • H
Resource Exhaustion

<0:2.1.2-4.el8
  • H
Always-Incorrect Control Flow Implementation

<0:2.1.2-4.el8
  • H
Always-Incorrect Control Flow Implementation

<0:2.0.9-3.el8
  • H
Time-of-check Time-of-use (TOCTOU)

<0:2.0.9-3.el8
  • H
Time-of-check Time-of-use (TOCTOU)

<0:2.1.2-4.el8
  • H
Use After Free

<0:2.0.9-3.el8
  • H
Use After Free

<0:2.1.2-4.el8
  • H
Use After Free

<0:2.1.2-4.el8
  • H
Use After Free

<0:2.0.9-3.el8
  • H
NULL Pointer Dereference

<0:2.0.9-3.el8
  • H
NULL Pointer Dereference

<0:2.1.2-4.el8
  • H
Resource Exhaustion

<0:2.0.9-3.el8
  • H
Use After Free

*
  • H
Use After Free

*
  • M
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
Allocation of Resources Without Limits or Throttling

<0:2.0.9-3.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:2.1.2-4.el8
  • M
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

<0:2.1.0-13.el8
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • H
Improper Validation of Array Index

<0:2.0.9-3.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.0.9-3.el8
  • H
Resource Exhaustion

<0:1.0.2-3.el8
  • M
Resource Exhaustion

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Resource Exhaustion

<0:2.1.5-1.el8
  • M
Insufficient Entropy

<0:2.1.5-1.el8
  • L
Insufficient Entropy

*
  • M
Improper Privilege Management

<0:2.1.5-1.el8
  • M
Integer Overflow or Wraparound

<0:2.1.5-1.el8
  • M
Buffer Overflow

<0:2.1.5-1.el8
  • M
Directory Traversal

<0:2.1.5-1.el8
  • M
Resource Exhaustion

<0:2.1.5-1.el8
  • C
Unchecked Return Value

<0:2.1.3-1.el8
  • M
Unchecked Return Value

*
  • C
Incorrect Authorization

<0:2.1.3-1.el8
  • C
Integer Overflow or Wraparound

<0:2.1.3-1.el8
  • H
Improper Input Validation

<0:2.0.9-3.el8
  • H
Race Condition

<0:2.0.9-3.el8
  • H
Improper Input Validation

<0:2.0.9-3.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:1.1.2-3.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:1.0.10-3.el8
  • M
Incorrect Calculation

*
  • M
Incorrect Calculation

*
  • M
Incorrect Calculation

*
  • M
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • H
Resource Exhaustion

<0:1.0.1-7.el8
  • H
Resource Exhaustion

<0:1.0.1-7.el8
  • H
Improper Validation of Array Index

<0:2.0.9-3.el8
  • H
Improper Validation of Array Index

<0:2.0.9-3.el8