odo vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the odo package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Algorithmic Complexity

*
  • M
HTTP Request Smuggling

*
  • H
Resource Exhaustion

*
  • H
Improper Validation of Syntactic Correctness of Input

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Resource Exhaustion

*
  • M
Truncation of Security-relevant Information

*
  • H
Resource Exhaustion

*
  • L
Insufficient Entropy

*
  • M
Buffer Overflow

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Integer Overflow or Wraparound

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Incorrect Regular Expression

*
  • M
Resource Exhaustion

*
  • C
Directory Traversal

*
  • L
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Handling of Unicode Encoding

*
  • M
Directory Traversal

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Information Exposure

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
HTTP Request Smuggling

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
HTTP Request Smuggling

*
  • M
Resource Exhaustion

*
  • H
Exposure of Private Information ('Privacy Violation')

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Use of Uninitialized Variable

*
  • H
Arbitrary Argument Injection

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • H
Improper Input Validation

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • M
Out-of-bounds Read

*
  • H
Cross-site Scripting (XSS)

*
  • H
Directory Traversal

*
  • H
Resource Exhaustion

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Open Redirect

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Arbitrary Code Injection

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Authorization Bypass Through User-Controlled Key

*