trustee-guest-components

Direct Vulnerabilities

Known vulnerabilities in the trustee-guest-components package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Multiple Locks of a Critical Resource

*
  • L
Origin Validation Error

*
  • M
Cleartext Transmission of Sensitive Information

*
  • M
Comparison Using Wrong Factors

*
  • M
Information Exposure

*
  • M
Exposure of Data Element to Wrong Session

*
  • M
Information Exposure

*
  • M
HTTP Request Smuggling

*
  • L
Out-of-bounds Write

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Improper Validation of Unsafe Equivalence in Input

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Excessive Platform Resource Consumption within a Loop

*
  • M
Cross-site Scripting (XSS)

*
  • L
Information Exposure

*
  • L
Improperly Implemented Security Check for Standard

*
  • L
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • L
Authentication Bypass by Primary Weakness

*
  • M
NULL Pointer Dereference

*
  • M
Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element

*
  • M
Link Following

*
  • L
Improper Validation of Syntactic Correctness of Input

*
  • M
Authentication Bypass by Primary Weakness

*
  • M
Information Exposure

*
  • L
Improper Check or Handling of Exceptional Conditions

*
  • M
Expired Pointer Dereference

*
  • M
Incorrect Implementation of Authentication Algorithm

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Directory Traversal

*
  • M
Signed to Unsigned Conversion Error

*
  • M
Improper Certificate Validation

*
  • M
Creation of Immutable Text Using String Concatenation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

*
  • M
Expected Behavior Violation

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Uncontrolled Recursion

*
  • M
CVE-2025-4673

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Double Free

*
  • M
HTTP Request Smuggling

*
  • M
Improper Validation of Unsafe Equivalence in Input

*
  • M
Improper Input Validation

*