trustee-guest-components

Direct Vulnerabilities

Known vulnerabilities in the trustee-guest-components package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Cleartext Transmission of Sensitive Information

*
  • M
Information Exposure

*
  • M
Comparison Using Wrong Factors

*
  • M
Exposure of Data Element to Wrong Session

*
  • M
Information Exposure

*
  • L
Origin Validation Error

*
  • M
HTTP Request Smuggling

*
  • L
Out-of-bounds Write

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Improper Validation of Unsafe Equivalence in Input

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Excessive Platform Resource Consumption within a Loop

*
  • M
Cross-site Scripting (XSS)

*
  • M
NULL Pointer Dereference

*
  • L
Information Exposure

*
  • L
Improperly Implemented Security Check for Standard

*
  • L
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • L
Authentication Bypass by Primary Weakness

*
  • H
Incorrect Behavior Order: Authorization Before Parsing and Canonicalization

*
  • M
Link Following

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
Improper Validation of Syntactic Correctness of Input

*
  • M
NULL Pointer Dereference

*
  • H
Improper Validation of Syntactic Correctness of Input

*
  • H
Improper Certificate Validation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Uncaught Exception

*
  • M
Expired Pointer Dereference

*
  • M
Authentication Bypass by Primary Weakness

*
  • M
Information Exposure

*
  • M
Incorrect Implementation of Authentication Algorithm

*
  • M
CVE-2025-68121

*
  • M
Directory Traversal

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • L
Improper Check or Handling of Exceptional Conditions

*
  • M
Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element

*
  • M
Signed to Unsigned Conversion Error

*
  • H
Excessive Platform Resource Consumption within a Loop

*
  • M
Improper Certificate Validation

*
  • L
CVE-2025-58186

*
  • M
Resource Exhaustion

*
  • M
Reachable Assertion

*
  • M
Creation of Immutable Text Using String Concatenation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

*
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • H
Authorization Bypass Through User-Controlled Key

*
  • M
Expected Behavior Violation

*
  • M
Directory Traversal

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • M
Uncontrolled Recursion

*
  • M
CVE-2025-4673

*
  • M
Improper Input Validation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Validation of Unsafe Equivalence in Input

*
  • M
Double Free

*
  • M
Use After Free

*