Direct Vulnerabilities

Known vulnerabilities in the clippy package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Incorrect Calculation of Multi-Byte String Length

<0:1.94.0-1.amzn2.0.2
  • M
Link Following

<0:1.94.0-1.amzn2.0.2
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:1.94.0-1.amzn2.0.2
  • M
Use of Out-of-range Pointer Offset

<0:1.93.0-1.amzn2.0.1
  • M
ALAS2-2026-3188

<0:1.92.0-1.amzn2.0.1
  • M
Numeric Truncation Error

<0:1.86.0-1.amzn2.0.3
  • M
Buffer Over-read

<0:1.82.0-4.amzn2.0.2
  • M
Uncontrolled Recursion

<0:1.86.0-1.amzn2.0.2
  • H
Heap-based Buffer Overflow

<0:1.82.0-4.amzn2.0.2
  • H
Heap-based Buffer Overflow

<0:1.68.2-1.amzn2.0.6
  • H
Resource Exhaustion

<0:1.68.2-1.amzn2.0.6
  • M
Cross-site Scripting (XSS)

<0:1.68.2-1.amzn2.0.4
  • H
Incorrect Default Permissions

<0:1.68.2-1.amzn2.0.3
  • M
Resource Exhaustion

<0:1.66.1-1.amzn2.0.1
  • M
Directory Traversal

<0:1.66.1-1.amzn2.0.1
  • M
Use After Free

<0:1.56.1-1.amzn2.0.1
  • M
Out-of-Bounds

<0:1.56.1-1.amzn2.0.1
  • M
Time-of-check Time-of-use (TOCTOU)

<0:1.61.0-2.amzn2.0.1
  • M
Integer Overflow or Wraparound

<0:1.56.1-1.amzn2.0.1
  • M
Improper Handling of Exceptional Conditions

<0:1.56.1-1.amzn2.0.1
  • M
Improper Input Validation

<0:1.56.1-1.amzn2.0.1