odo vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the odo package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Algorithmic Complexity

*
  • M
HTTP Request Smuggling

*
  • H
Resource Exhaustion

*
  • H
Improper Validation of Syntactic Correctness of Input

*
  • M
Improper Input Validation

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Placement of User into Incorrect Group

*
  • L
Improper Verification of Cryptographic Signature

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • M
Truncation of Security-relevant Information

*
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • H
Resource Exhaustion

*
  • L
Improper Handling of Exceptional Conditions

*
  • L
Insufficient Entropy

*
  • H
Improper Authorization

*
  • M
Buffer Overflow

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Integer Overflow or Wraparound

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Incorrect Regular Expression

*
  • M
Resource Exhaustion

*
  • C
Directory Traversal

*
  • L
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Improper Handling of Unicode Encoding

*
  • M
Directory Traversal

*
  • M
Improper Handling of Unicode Encoding

*
  • M
Resource Exhaustion

*
  • M
Arbitrary Code Injection

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Resource Exhaustion

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Information Exposure

*
  • M
CVE-2022-41715

*
  • M
Resource Exhaustion

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
HTTP Request Smuggling

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
HTTP Request Smuggling

*
  • M
Resource Exhaustion

*
  • H
Improper Handling of Unicode Encoding

*
  • H
Exposure of Private Information ('Privacy Violation')

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Use of Uninitialized Variable

*
  • H
Arbitrary Argument Injection

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • H
Memory Leak

*
  • H
Improper Input Validation

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Out-of-bounds Read

*
  • H
Cross-site Scripting (XSS)

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • H
Directory Traversal

*
  • H
Resource Exhaustion

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Open Redirect

*
  • H
CVE-2023-28154

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Arbitrary Code Injection

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Authorization Bypass Through User-Controlled Key

*