satellite/iop-advisor-frontend-rhel9

Direct Vulnerabilities

Known vulnerabilities in the satellite/iop-advisor-frontend-rhel9 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Directory Traversal

*
  • H
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Server-Side Request Forgery (SSRF)

*
  • H
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • M
Comparison Using Wrong Factors

*
  • M
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • M
Insufficient Granularity of Access Control

*
  • M
CRLF Injection

*
  • M
Cross-site Scripting (XSS)

*
  • L
Out-of-bounds Write

*
  • M
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • H
Improperly Controlled Modification of Dynamically-Determined Object Attributes

*
  • H
Arbitrary Code Injection

*
  • M
Creation of Temporary File in Directory with Incorrect Permissions

*
  • M
Inefficient Regular Expression Complexity

*
  • H
Inefficient Regular Expression Complexity

*
  • H
Improper Validation of Specified Type of Input

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • M
Open Redirect

*
  • H
Cross-site Scripting (XSS)

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Improper Verification of Cryptographic Signature

*
  • M
Integer Overflow or Wraparound

*
  • M
Resource Exhaustion

*