rosa vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the rosa package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Asymmetric Resource Consumption (Amplification)

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Resource Exhaustion

*
  • M
Misinterpretation of Input

*
  • H
Resource Exhaustion

*
  • H
Uncontrolled Recursion

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • L
Improper Verification of Cryptographic Signature

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Resource Exhaustion

*
  • L
Improper Handling of Exceptional Conditions

*
  • L
Insufficient Entropy

*
  • H
Improper Authorization

*
  • M
Buffer Overflow

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Integer Overflow or Wraparound

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • L
Resource Exhaustion

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
CVE-2023-39321

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Directory Traversal

*
  • M
HTTP Response Splitting

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Information Exposure

*
  • M
CVE-2022-41715

*
  • M
Resource Exhaustion

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
HTTP Request Smuggling

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
Resource Exhaustion

*
  • M
Arbitrary Code Injection

*
  • M
Use of Uninitialized Variable

*
  • H
Memory Leak

*
  • M
SQL Injection

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*