jitsucom-jitsu vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the jitsucom-jitsu package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-mh29-5h37-fv8m

<2.11.0-r7
  • L
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<2.11.0-r7
  • L
GHSA-5jpx-9hw9-2fx4

<2.11.0-r6
  • L
GHSA-mm7p-fcc7-pg87

<2.11.0-r4
  • L
GHSA-33vc-wfww-vjfv

<2.11.0-r3
  • L
CVE-2025-9910

<2.11.0-r3
  • L
Allocation of Resources Without Limits or Throttling

<2.11.0-r2
  • L
GHSA-4hjh-wcwx-xvwj

<2.11.0-r2
  • H
Server-Side Request Forgery (SSRF)

<2.11.0-r1
  • L
GHSA-xv57-4mr9-wg8v

<2.11.0-r1
  • L
GHSA-4342-x723-ch2f

<2.11.0-r1
  • L
Information Exposure Through Caching

<2.11.0-r1
  • L
Improper Input Validation

<2.11.0-r1
  • L
GHSA-g5qg-72qw-gw5v

<2.11.0-r1
  • L
GHSA-fjxv-7rqg-78g4

<2.10.0-r4
  • L
CVE-2025-7783

<2.10.0-r4
  • L
GHSA-r2fc-ccr8-96c4

<2.10.0-r2
  • L
HTTP Request Smuggling

<2.10.0-r2
  • L
Directory Traversal

<2.10.0-r0
  • L
GHSA-8cj5-5rvv-wf4v

<2.10.0-r0
  • L
GHSA-f82v-jwr5-mffw

<2.9.0-r0
  • L
Incorrect Authorization

<2.9.0-r0
  • L
GHSA-968p-4wvh-cqc8

<2.8.6-r3
  • L
Inefficient Regular Expression Complexity

<2.8.6-r3
  • M
Server-Side Request Forgery (SSRF)

<2.8.6-r2
  • L
GHSA-jr5f-v2jv-69x6

<2.8.6-r2
  • L
Use of Insufficiently Random Values

<2.8.6-r1
  • L
GHSA-c76h-2ccp-4975

<2.8.6-r1
  • L
Allocation of Resources Without Limits or Throttling

<2.8.5-r3
  • L
GHSA-7m27-7ghc-44w9

<2.8.5-r3
  • L
CVE-2024-55565

<2.8.5-r0
  • L
GHSA-mwcw-c2x4-8c55

<2.8.5-r0
  • H
Inefficient Regular Expression Complexity

<2.8.4-r0
  • L
GHSA-pfq8-rq6v-vf5m

<2.8.4-r0
  • L
GHSA-pxg6-pf52-xh8x

<2.8.2-r2
  • L
CVE-2024-47764

<2.8.2-r2
  • H
Uncontrolled Recursion

<2.8.2-r1
  • L
GHSA-g77x-44xx-532m

<2.8.2-r1
  • L
Authorization Bypass Through User-Controlled Key

<2.8.2-r1
  • L
GHSA-gp8f-8m3g-qvj9

<2.8.2-r1
  • H
Server-Side Request Forgery (SSRF)

<2.8.0-r1
  • L
GHSA-8hc4-vh64-cxmj

<2.8.0-r1
  • L
GHSA-fr5h-rqp8-mj6g

<2.8.0-r0
  • H
CVE-2024-34351

<2.8.0-r0
  • L
GHSA-7v5v-9h63-cj86

<2.7.0-r1
  • L
CVE-2024-37168

<2.7.0-r1