cloudbeat-8.19

Direct Vulnerabilities

Known vulnerabilities in the cloudbeat-8.19 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-3xc5-wrhm-f963

<8.19.13-r9
  • L
CVE-2026-4660

<8.19.13-r8
  • L
GHSA-92mm-2pjq-r785

<8.19.13-r8
  • M
Directory Traversal

<8.19.13-r8
  • L
GHSA-hr2v-4r36-88hr

<8.19.13-r8
  • L
GHSA-m4pr-4j3g-9v7v

<8.19.13-r8
  • M
Cross-site Scripting (XSS)

<8.19.13-r8
  • L
GHSA-5w89-2c2x-6x66

<8.19.13-r8
  • H
Improper Certificate Validation

<8.19.13-r8
  • H
Allocation of Resources Without Limits or Throttling

<8.19.13-r8
  • L
GHSA-7mr4-xjxg-34g6

<8.19.13-r8
  • M
Allocation of Resources Without Limits or Throttling

<8.19.13-r8
  • L
GHSA-x4jj-h2v8-hqqv

<8.19.13-r8
  • L
CVE-2026-32280

<8.19.13-r8
  • L
GHSA-jrg3-gfjw-hm96

<8.19.13-r8
  • H
Incorrect Authorization

<8.19.13-r8
  • L
GHSA-gjvh-7jh8-7xhm

<8.19.13-r8
  • H
Untrusted Search Path

<8.19.13-r5
  • L
GHSA-hfvc-g4fc-pqhx

<8.19.13-r5
  • L
GHSA-78h2-9frx-2jm8

<8.19.13-r4
  • L
Uncaught Exception

<8.19.13-r4
  • L
GHSA-gm2x-2g9h-ccm8

<8.19.13-r3
  • L
GHSA-jhf3-xxhw-2wpp

<8.19.13-r3
  • L
Integer Underflow

<8.19.13-r3
  • L
Improper Validation of Array Index

<8.19.13-r3
  • L
GHSA-4vrq-3vrq-g6gg

<8.19.13-r2
  • L
GHSA-4c29-8rgm-jvjj

<8.19.13-r2
  • C
Directory Traversal

<8.19.13-r2
  • H
Directory Traversal

<8.19.13-r2
  • L
GHSA-p77j-4mvh-x3m3

<8.19.13-r1
  • L
Improper Authorization

<8.19.13-r1
  • L
GHSA-p436-gjf2-799p

<8.19.12-r4
  • H
CVE-2025-15558

<8.19.12-r4
  • L
CVE-2026-27141

<8.19.12-r2
  • L
GHSA-8fj7-8h3w-xwfm

<8.19.12-r2
  • L
GHSA-fcv2-xgw5-pqxf

<8.19.12-r0
  • L
GHSA-2mj3-6grc-px38

<8.19.12-r0
  • H
CVE-2026-0528

<8.19.12-r0
  • L
GHSA-q9hv-hpm4-hj6x

<8.19.12-r1
  • L
Directory Traversal

<8.19.12-r0
  • L
GHSA-w2gr-585j-r428

<8.19.12-r0
  • C
CVE-2026-1229

<8.19.12-r1
  • L
GHSA-fj69-23m4-ccvv

<8.19.12-r0
  • L
Server-Side Request Forgery (SSRF)

<8.19.12-r0
  • L
GHSA-4c4x-jm2x-pf9j

<8.19.12-r0
  • L
CVE-2025-68383

<8.19.12-r0
  • L
CVE-2025-68388

<8.19.12-r0
  • L
GHSA-273p-m2cw-6833

<8.19.12-r0
  • L
NULL Pointer Dereference

<8.19.12-r0
  • M
Improper Validation of Integrity Check Value

<8.19.11-r1
  • L
GHSA-37cx-329c-33x3

<8.19.11-r1
  • L
Allocation of Resources Without Limits or Throttling

<8.19.11-r0
  • L
GHSA-g9q4-qjx4-2v7q

<8.19.11-r0
  • L
GHSA-gr56-3gp6-6gmj

<8.19.11-r0
  • L
CVE-2025-61730

<8.19.11-r0
  • L
GHSA-gm9r-q53w-2gh4

<8.19.11-r0
  • L
Allocation of Resources Without Limits or Throttling

<8.19.11-r0
  • L
CVE-2025-61731

<8.19.11-r0
  • L
Out-of-bounds Write

<8.19.11-r0
  • L
GHSA-xvqr-69v8-f3gv

<8.19.11-r0
  • L
GHSA-cm6p-qc7v-m3jw

<8.19.11-r0
  • L
GHSA-846p-jg2w-w324

<8.19.10-r0
  • H
Reachable Assertion

<8.19.10-r0
  • L
GHSA-fphv-w9fq-2525

<8.19.10-r0
  • H
Improper Verification of Cryptographic Signature

<8.19.10-r0
  • L
CVE-2025-58181

<8.19.7-r1
  • L
GHSA-f6x5-jh6r-wrfv

<8.19.7-r1
  • L
GHSA-j5w8-q4qc-rx2x

<8.19.7-r1
  • L
CVE-2025-47914

<8.19.7-r1
  • M
Memory Leak

<8.19.6-r2
  • H
Incorrect Execution-Assigned Permissions

<8.19.6-r2