prism vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the prism package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Directory Traversal

<5.14.3-r9
  • L
GHSA-qpx9-hpmf-5gmw

<5.14.3-r9
  • L
GHSA-qffp-2rhf-9h96

<5.14.3-r9
  • H
Allocation of Resources Without Limits or Throttling

<5.14.3-r9
  • H
Buffer Overflow

<5.14.3-r8
  • L
GHSA-h5c3-5r3r-rr8q

<5.14.3-r8
  • L
Inefficient Regular Expression Complexity

<5.14.3-r8
  • L
Inefficient Regular Expression Complexity

<5.14.3-r8
  • L
Algorithmic Complexity

<5.14.3-r8
  • H
Inefficient Regular Expression Complexity

<5.14.3-r8
  • L
GHSA-rmvr-2pp2-xj38

<5.14.3-r8
  • L
GHSA-7r86-cg39-jmmj

<5.14.3-r8
  • L
GHSA-23c5-xmqv-rm74

<5.14.3-r8
  • L
Inefficient Regular Expression Complexity

<5.14.3-r8
  • L
Inefficient Regular Expression Complexity

<5.14.3-r8
  • L
GHSA-3ppc-4f35-3m26

<5.14.3-r8
  • L
GHSA-fj3w-jwp8-x2g3

<5.14.3-r8
  • L
GHSA-xx4v-prfh-6cgc

<5.14.3-r8
  • L
Incorrect Regular Expression

<5.14.3-r7
  • L
GHSA-jmr7-xgp7-cmfj

<5.14.3-r7
  • L
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<5.14.3-r7
  • L
GHSA-m7jm-9gc2-mpf2

<5.14.3-r7
  • L
GHSA-2g4f-4pwh-qvx6

<5.14.3-r7
  • H
Directory Traversal

<5.14.3-r7
  • L
GHSA-83g3-92jg-28cx

<5.14.3-r7
  • L
Inefficient Regular Expression Complexity

<5.14.3-r7
  • L
GHSA-43fc-jf86-j433

<5.14.3-r6
  • L
Improper Check for Unusual or Exceptional Conditions

<5.14.3-r6
  • L
Improper Input Validation

<5.14.3-r5
  • L
GHSA-37qj-frw5-hhjh

<5.14.3-r5
  • L
GHSA-p5wg-g6qr-c7cg

<5.14.3-r5
  • L
CVE-2025-50537

<5.14.3-r5
  • L
GHSA-xxjr-mmjv-4gpg

<5.14.3-r5
  • L
GHSA-r6q2-hw4h-h46w

<5.14.3-r5
  • M
Improper Handling of Unicode Encoding

<5.14.3-r5
  • M
CVE-2025-13465

<5.14.3-r5
  • L
GHSA-34x7-hfp2-rc4v

<5.14.3-r5
  • L
Directory Traversal

<5.14.3-r5
  • H
Resource Exhaustion

<5.14.3-r2
  • L
GHSA-8qq5-rm4j-mr97

<5.14.3-r2
  • M
Directory Traversal

<5.14.3-r2
  • L
GHSA-73rr-hh4g-fpgx

<5.14.3-r2
  • L
OS Command Injection

<5.14.3-r1
  • L
GHSA-5j98-mcp5-4vw2

<5.14.3-r1
  • L
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<5.14.3-r1
  • L
GHSA-mh29-5h37-fv8m

<5.14.3-r1
  • L
GHSA-4hjh-wcwx-xvwj

<5.14.2-r8
  • L
Allocation of Resources Without Limits or Throttling

<5.14.2-r8
  • L
GHSA-52f5-9888-hmc6

<5.14.2-r7
  • M
Link Following

<5.14.2-r7
  • L
CVE-2025-7783

<5.14.2-r4
  • L
GHSA-fjxv-7rqg-78g4

<5.14.2-r4
  • L
GHSA-v6h2-p8h4-qcjw

<5.14.2-r2
  • L
Resource Exhaustion

<5.14.2-r2
  • L
CVE-2025-1302

<5.12.1-r4
  • L
GHSA-hw8r-x6gr-5gjp

<5.12.1-r4
  • L
GHSA-jr5f-v2jv-69x6

<5.12.1-r4
  • L
GHSA-968p-4wvh-cqc8

<5.12.1-r4
  • L
Inefficient Regular Expression Complexity

<5.12.1-r4
  • M
Server-Side Request Forgery (SSRF)

<5.12.1-r4
  • L
GHSA-pppg-cpfq-h7wr

<5.11.2-r1
  • L
CVE-2024-21534

<5.11.2-r1