ctop vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ctop package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2024-34156

<0.7.7-r20
  • L
GHSA-crqm-pwhx-j97f

<0.7.7-r20
  • L
GHSA-j7vj-rw65-4v26

<0.7.7-r20
  • L
CVE-2024-34158

<0.7.7-r20
  • L
GHSA-8xfx-rj4p-23jm

<0.7.7-r20
  • L
CVE-2024-34155

<0.7.7-r20
  • L
GHSA-jfvp-7x6p-h2pv

<0.7.7-r19
  • L
CVE-2024-45310

<0.7.7-r19
  • L
GHSA-v23v-6jw2-98fq

<0.7.7-r17
  • L
CVE-2024-41110

<0.7.7-r17
  • L
GHSA-hw49-2p59-3mhj

<0.7.7-r16
  • L
CVE-2024-24791

<0.7.7-r16
  • L
GHSA-236w-p7wf-5ph8

<0.7.7-r15
  • L
GHSA-49gw-vxvf-fc2g

<0.7.7-r15
  • C
CVE-2024-24790

<0.7.7-r15
  • M
CVE-2024-24789

<0.7.7-r15
  • L
GHSA-2jwv-jmq4-4j3r

<0.7.7-r14
  • L
CVE-2024-24787

<0.7.7-r14
  • L
GHSA-5fq7-4mxc-535h

<0.7.7-r14
  • L
CVE-2024-24788

<0.7.7-r14
  • M
Incorrect Permission Assignment for Critical Resource

<0.7.7-r13
  • L
GHSA-2mm7-x5h6-5pvq

<0.7.7-r13
  • M
Allocation of Resources Without Limits or Throttling

<0.7.7-r13
  • L
CVE-2024-29018

<0.7.7-r13
  • L
CVE-2024-24786

<0.7.7-r13
  • M
Unprotected Alternate Channel

<0.7.7-r13
  • L
GHSA-c2h3-6mxw-7mvq

<0.7.7-r13
  • L
GHSA-259w-8hf6-59c2

<0.7.7-r13
  • M
Incorrect Permission Assignment for Critical Resource

<0.7.7-r13
  • L
GHSA-jq35-85cj-fj4p

<0.7.7-r13
  • L
GHSA-c3h9-896r-86jm

<0.7.7-r13
  • M
Exposure of Resource to Wrong Sphere

<0.7.7-r13
  • L
GHSA-xr7r-f8xq-vfvv

<0.7.7-r13
  • L
GHSA-g2j6-57v7-gm8c

<0.7.7-r13
  • L
GHSA-crp2-qrr5-8pq7

<0.7.7-r13
  • M
Missing Encryption of Sensitive Data

<0.7.7-r13
  • H
Link Following

<0.7.7-r13
  • M
Resource Exhaustion

<0.7.7-r13
  • H
Unprotected Alternate Channel

<0.7.7-r13
  • L
GHSA-m8cg-xc2p-r3fc

<0.7.7-r13
  • M
Memory Leak

<0.7.7-r13
  • M
Improper Preservation of Permissions

<0.7.7-r13
  • L
GHSA-77vh-xpmg-72qh

<0.7.7-r13
  • L
GHSA-232p-vwff-86mp

<0.7.7-r13
  • L
GHSA-f3fp-gc8g-vw66

<0.7.7-r13
  • H
Incorrect Default Permissions

<0.7.7-r13
  • H
CVE-2022-23648

<0.7.7-r13
  • L
GHSA-xw73-rw38-6vjc

<0.7.7-r13
  • H
Improper Validation of Array Index

<0.7.7-r13
  • L
GHSA-36xw-fx78-c5r4

<0.7.7-r13
  • H
Directory Traversal

<0.7.7-r13
  • H
Use of Incorrectly-Resolved Name or Reference

<0.7.7-r13
  • L
GHSA-5j5w-g665-5m35

<0.7.7-r13
  • L
GHSA-c72p-9xmj-rx3w

<0.7.7-r13
  • L
GHSA-hmfx-3pcx-653p

<0.7.7-r13
  • L
GHSA-5ffw-gxpp-mxpf

<0.7.7-r13
  • L
GHSA-7ww5-4wqc-m92c

<0.7.7-r13
  • M
Improper Privilege Management

<0.7.7-r13
  • L
GHSA-p782-xgp4-8hr8

<0.7.7-r13
  • M
Incorrect Resource Transfer Between Spheres

<0.7.7-r13
  • L
GHSA-vpvm-3wq2-2wvm

<0.7.7-r13
  • H
Incorrect Authorization

<0.7.7-r13
  • H
Origin Validation Error

<0.7.7-r13
  • L
GHSA-mq39-4gv4-mvpx

<0.7.7-r13
  • L
GHSA-6g2q-w5j3-fwh4

<0.7.7-r13
  • L
GHSA-6xv5-86q9-7xr8

<0.7.7-r13
  • L
GHSA-2qjp-425j-52j9

<0.7.7-r13
  • H
Exposure of Resource to Wrong Sphere

<0.7.7-r13
  • L
GHSA-33pg-m6jh-5237

<0.7.7-r13
  • L
GHSA-8r3f-844c-mc37

<0.7.7-r13
  • L
GHSA-6wrf-mxfj-pf5p

<0.7.7-r13
  • L
GHSA-3q2c-pvp5-3cqp

<0.7.7-r11
  • L
GHSA-j6m3-gc37-6r6q

<0.7.7-r11
  • L
GHSA-32ch-6x54-q4h9

<0.7.7-r11
  • L
GHSA-fgq5-q76c-gx78

<0.7.7-r11
  • L
CVE-2024-24785

<0.7.7-r11
  • L
CVE-2023-45289

<0.7.7-r11
  • L
CVE-2023-45290

<0.7.7-r11
  • L
CVE-2024-24784

<0.7.7-r11
  • L
GHSA-rr6r-cfgf-gc6h

<0.7.7-r11
  • L
CVE-2024-24783

<0.7.7-r11
  • L
GHSA-5f94-vhjq-rpg8

<0.7.7-r10
  • M
CVE-2023-39326

<0.7.7-r10
  • H
CVE-2023-45285

<0.7.7-r10
  • L
GHSA-9f76-wg39-x86h

<0.7.7-r10