heketi-client vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the heketi-client package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Authorization

*
  • M
Use of Uninitialized Variable

*
  • H
Uncontrolled Recursion

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Uncontrolled Recursion

*
  • M
Improper Input Validation

*
  • M
Misinterpretation of Input

*
  • H
Memory Leak

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Truncation of Security-relevant Information

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Resource Exhaustion

*
  • M
Arbitrary Code Injection

*
  • M
Resource Exhaustion

*
  • H
Files or Directories Accessible to External Parties

<0:5.0.0-19.el7rhgs
  • H
OS Command Injection

<0:5.0.0-19.el7rhgs
  • M
Information Exposure Through Log Files

<0:9.0.0-9.5.el7rhgs
  • M
Incorrect Permission Assignment for Critical Resource

<0:9.0.0-9.5.el7rhgs
  • M
Improper Authentication

<0:9.0.0-7.el7rhgs
  • M
Improper Access Control

*
  • M
Improper Output Neutralization for Logs

*
  • M
Link Following

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • L
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
CVE-2022-41715

*
  • M
HTTP Request Smuggling

*
  • M
Directory Traversal

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Information Exposure

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
HTTP Request Smuggling

*
  • M
Integer Overflow or Wraparound

*
  • M
Buffer Overflow

*
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • H
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
Use of Insufficiently Random Values

*
  • M
Race Condition

*
  • M
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Incorrect Calculation

<0:10.4.0-2.el7rhgs
  • L
NULL Pointer Dereference

*
  • L
Race Condition

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

<0:10.4.0-2.el7rhgs
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Improper Handling of Length Parameter Inconsistency

*
  • L
Improper Validation of Array Index

*
  • L
Improper Validation of Array Index

*