mod24_session vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the mod24_session package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Resource Exhaustion

<0:2.4.46-1.90.amzn1
  • H
Out-of-Bounds

<0:2.4.46-1.90.amzn1
  • H
Resource Exhaustion

<0:2.4.46-1.90.amzn1
  • L
ALAS-2020-1418

<0:2.4.46-1.90.amzn1
  • H
NULL Pointer Dereference

<0:2.4.61-1.103.amzn1
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:2.4.61-1.103.amzn1
  • H
Improper Encoding or Escaping of Output

<0:2.4.61-1.103.amzn1
  • H
Improper Encoding or Escaping of Output

<0:2.4.61-1.103.amzn1
  • H
Resource Exhaustion

<0:2.4.59-1.102.amzn1
  • H
Out-of-bounds Read

<0:2.4.58-1.101.amzn1
  • H
Resource Exhaustion

<0:2.4.58-1.101.amzn1
  • H
Resource Exhaustion

<0:2.4.58-1.101.amzn1
  • H
HTTP Response Splitting

<0:2.4.56-1.100.amzn1
  • H
HTTP Response Splitting

<0:2.4.56-1.100.amzn1
  • H
HTTP Response Splitting

<0:2.4.56-1.100.amzn1
  • H
HTTP Request Smuggling

<0:2.4.56-1.100.amzn1
  • H
Out-of-bounds Read

<0:2.4.56-1.100.amzn1
  • M
Information Exposure

<0:2.4.54-1.98.amzn1
  • M
Integer Overflow or Wraparound

<0:2.4.54-1.98.amzn1
  • M
Allocation of Resources Without Limits or Throttling

<0:2.4.54-1.98.amzn1
  • M
Allocation of Resources Without Limits or Throttling

<0:2.4.54-1.98.amzn1
  • M
Out-of-bounds Read

<0:2.4.54-1.98.amzn1
  • M
Integer Overflow or Wraparound

<0:2.4.54-1.98.amzn1
  • M
HTTP Request Smuggling

<0:2.4.54-1.98.amzn1
  • M
Insufficient Verification of Data Authenticity

<0:2.4.54-1.98.amzn1
  • H
Integer Overflow or Wraparound

<0:2.4.53-1.96.amzn1
  • H
Integer Overflow or Wraparound

<0:2.4.53-1.96.amzn1
  • H
Improper Initialization

<0:2.4.53-1.96.amzn1
  • H
HTTP Request Smuggling

<0:2.4.53-1.96.amzn1
  • H
NULL Pointer Dereference

<0:2.4.52-1.95.amzn1
  • H
Resource Exhaustion

<0:2.4.52-1.95.amzn1
  • H
Server-Side Request Forgery (SSRF)

<0:2.4.51-1.94.amzn1
  • H
Buffer Overflow

<0:2.4.51-1.94.amzn1
  • H
Directory Traversal

<0:2.4.51-1.94.amzn1
  • H
Directory Traversal

<0:2.4.51-1.94.amzn1
  • H
Out-of-bounds Read

<0:2.4.51-1.94.amzn1
  • H
NULL Pointer Dereference

<0:2.4.51-1.94.amzn1
  • H
CVE-2021-33193

<0:2.4.51-1.94.amzn1
  • H
NULL Pointer Dereference

<0:2.4.51-1.94.amzn1
  • M
Out-of-bounds Write

<0:2.4.48-1.92.amzn1
  • M
NULL Pointer Dereference

<0:2.4.48-1.92.amzn1
  • M
Out-of-bounds Write

<0:2.4.48-1.92.amzn1
  • M
Missing Authorization

<0:2.4.48-1.92.amzn1
  • M
NULL Pointer Dereference

<0:2.4.48-1.92.amzn1
  • M
CVE-2021-30641

<0:2.4.48-1.92.amzn1
  • M
HTTP Request Smuggling

<0:2.4.48-1.92.amzn1
  • L
Buffer Overflow

<0:2.4.46-1.90.amzn1
  • L
HTTP Request Smuggling

<0:2.4.46-1.90.amzn1
  • L
HTTP Request Smuggling

<0:2.4.46-1.90.amzn1
  • L
Open Redirect

<0:2.4.43-1.89.amzn1
  • L
Use of Uninitialized Resource

<0:2.4.43-1.89.amzn1
  • M
Allocation of Resources Without Limits or Throttling

<0:2.4.41-1.88.amzn1
  • M
Use After Free

<0:2.4.41-1.88.amzn1
  • M
Out-of-bounds Write

<0:2.4.41-1.88.amzn1
  • M
Cross-site Scripting (XSS)

<0:2.4.41-1.88.amzn1
  • M
Out-of-bounds Write

<0:2.4.41-1.88.amzn1
  • M
Open Redirect

<0:2.4.41-1.88.amzn1
  • H
Use After Free

<0:2.4.39-1.87.amzn1
  • H
Race Condition

<0:2.4.39-1.87.amzn1
  • H
HTTP Request Smuggling

<0:2.4.39-1.87.amzn1
  • H
Use After Free

<0:2.4.39-1.87.amzn1
  • H
CVE-2019-0215

<0:2.4.39-1.87.amzn1
  • H
Use of Incorrectly-Resolved Name or Reference

<0:2.4.39-1.87.amzn1
  • H
Resource Exhaustion

<0:2.4.38-1.86.amzn1
  • H
CVE-2019-0190

<0:2.4.38-1.86.amzn1
  • H
Session Fixation

<0:2.4.38-1.86.amzn1
  • M
CVE-2018-11763

<0:2.4.37-1.83.amzn1
  • M
NULL Pointer Dereference

<0:2.4.34-1.82.amzn1
  • M
Out-of-bounds Read

<0:2.4.33-2.78.amzn1
  • M
CVE-2018-1283

<0:2.4.33-2.78.amzn1
  • M
Improper Authentication

<0:2.4.33-2.78.amzn1
  • M
NULL Pointer Dereference

<0:2.4.33-2.78.amzn1
  • M
Out-of-bounds Write

<0:2.4.33-2.78.amzn1
  • M
Out-of-Bounds

<0:2.4.33-2.78.amzn1
  • M
Improper Input Validation

<0:2.4.33-2.78.amzn1
  • H
Use After Free

<0:2.4.27-3.73.amzn1
  • M
Improper Input Validation

<0:2.4.27-3.71.amzn1
  • M
Improper Authentication

<0:2.4.27-3.71.amzn1
  • M
Out-of-Bounds

<0:2.4.27-3.71.amzn1
  • M
Improper Data Handling

<0:2.4.27-3.71.amzn1
  • M
NULL Pointer Dereference

<0:2.4.27-3.71.amzn1
  • M
NULL Pointer Dereference

<0:2.4.27-3.71.amzn1
  • M
Cryptographic Issues

<0:2.4.25-1.68.amzn1
  • M
Improper Input Validation

<0:2.4.25-1.68.amzn1
  • M
Improper Data Handling

<0:2.4.25-1.68.amzn1
  • H
Improper Access Control

<0:2.4.23-1.65.amzn1
  • M
Access Restriction Bypass

<0:2.4.16-1.62.amzn1
  • M
Improper Input Validation

<0:2.4.16-1.62.amzn1
  • M
Improper Input Validation

<0:2.4.16-1.62.amzn1
  • M
CVE-2015-0253

<0:2.4.16-1.62.amzn1
  • L
Access Restriction Bypass

<0:2.4.10-15.58.amzn1
  • L
Resource Management Errors

<0:2.4.10-15.58.amzn1
  • L
Access Restriction Bypass

<0:2.4.10-15.58.amzn1
  • L
Out-of-Bounds

<0:2.4.10-15.58.amzn1
  • H
Race Condition

<0:2.4.10-1.59.amzn1
  • H
Resource Management Errors

<0:2.4.10-1.59.amzn1
  • H
Resource Management Errors

<0:2.4.10-1.59.amzn1
  • M
Improper Input Validation

<0:2.4.9-1.54.amzn1
  • M
Cross-site Scripting (XSS)

<0:2.4.4-2.46.amzn1
  • M
Cryptographic Issues

<0:2.4.4-2.46.amzn1
  • M
Cross-site Scripting (XSS)

<0:2.4.4-2.46.amzn1
  • M
Cross-site Scripting (XSS)

<0:2.4.4-2.41.amzn1
  • M
Cross-site Scripting (XSS)

<0:2.4.4-2.41.amzn1