ctop vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ctop package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-jfvp-7x6p-h2pv

<0.7.7-r19
  • L
CVE-2024-45310

<0.7.7-r19
  • L
GHSA-v23v-6jw2-98fq

<0.7.7-r17
  • L
CVE-2024-41110

<0.7.7-r17
  • L
CVE-2024-24791

<0.7.7-r16
  • L
GHSA-hw49-2p59-3mhj

<0.7.7-r16
  • L
GHSA-49gw-vxvf-fc2g

<0.7.7-r15
  • M
CVE-2024-24789

<0.7.7-r15
  • L
GHSA-236w-p7wf-5ph8

<0.7.7-r15
  • C
CVE-2024-24790

<0.7.7-r15
  • L
GHSA-5fq7-4mxc-535h

<0.7.7-r14
  • L
CVE-2024-24787

<0.7.7-r14
  • L
GHSA-2jwv-jmq4-4j3r

<0.7.7-r14
  • L
CVE-2024-24788

<0.7.7-r14
  • L
GHSA-2mm7-x5h6-5pvq

<0.7.7-r13
  • M
Incorrect Permission Assignment for Critical Resource

<0.7.7-r13
  • L
GHSA-6xv5-86q9-7xr8

<0.7.7-r13
  • L
GHSA-259w-8hf6-59c2

<0.7.7-r13
  • L
GHSA-f3fp-gc8g-vw66

<0.7.7-r13
  • H
Exposure of Resource to Wrong Sphere

<0.7.7-r13
  • H
CVE-2022-23648

<0.7.7-r13
  • L
GHSA-36xw-fx78-c5r4

<0.7.7-r13
  • M
Allocation of Resources Without Limits or Throttling

<0.7.7-r13
  • M
Memory Leak

<0.7.7-r13
  • L
GHSA-2qjp-425j-52j9

<0.7.7-r13
  • H
Origin Validation Error

<0.7.7-r13
  • M
Unprotected Alternate Channel

<0.7.7-r13
  • L
GHSA-6wrf-mxfj-pf5p

<0.7.7-r13
  • L
GHSA-g2j6-57v7-gm8c

<0.7.7-r13
  • L
CVE-2024-24786

<0.7.7-r13
  • M
Improper Privilege Management

<0.7.7-r13
  • H
Incorrect Default Permissions

<0.7.7-r13
  • H
Incorrect Authorization

<0.7.7-r13
  • H
Directory Traversal

<0.7.7-r13
  • M
Missing Encryption of Sensitive Data

<0.7.7-r13
  • L
GHSA-232p-vwff-86mp

<0.7.7-r13
  • L
CVE-2024-29018

<0.7.7-r13
  • M
Incorrect Permission Assignment for Critical Resource

<0.7.7-r13
  • M
Improper Preservation of Permissions

<0.7.7-r13
  • M
Exposure of Resource to Wrong Sphere

<0.7.7-r13
  • H
Improper Validation of Array Index

<0.7.7-r13
  • L
GHSA-crp2-qrr5-8pq7

<0.7.7-r13
  • L
GHSA-mq39-4gv4-mvpx

<0.7.7-r13
  • L
GHSA-xr7r-f8xq-vfvv

<0.7.7-r13
  • L
GHSA-5j5w-g665-5m35

<0.7.7-r13
  • H
Unprotected Alternate Channel

<0.7.7-r13
  • H
Use of Incorrectly-Resolved Name or Reference

<0.7.7-r13
  • L
GHSA-jq35-85cj-fj4p

<0.7.7-r13
  • L
GHSA-5ffw-gxpp-mxpf

<0.7.7-r13
  • L
GHSA-c2h3-6mxw-7mvq

<0.7.7-r13
  • M
Incorrect Resource Transfer Between Spheres

<0.7.7-r13
  • L
GHSA-77vh-xpmg-72qh

<0.7.7-r13
  • L
GHSA-c72p-9xmj-rx3w

<0.7.7-r13
  • L
GHSA-33pg-m6jh-5237

<0.7.7-r13
  • L
GHSA-hmfx-3pcx-653p

<0.7.7-r13
  • L
GHSA-7ww5-4wqc-m92c

<0.7.7-r13
  • L
GHSA-m8cg-xc2p-r3fc

<0.7.7-r13
  • L
GHSA-c3h9-896r-86jm

<0.7.7-r13
  • L
GHSA-vpvm-3wq2-2wvm

<0.7.7-r13
  • H
Link Following

<0.7.7-r13
  • L
GHSA-8r3f-844c-mc37

<0.7.7-r13
  • M
Resource Exhaustion

<0.7.7-r13
  • L
GHSA-p782-xgp4-8hr8

<0.7.7-r13
  • L
GHSA-xw73-rw38-6vjc

<0.7.7-r13
  • L
GHSA-6g2q-w5j3-fwh4

<0.7.7-r13
  • L
GHSA-fgq5-q76c-gx78

<0.7.7-r11
  • L
CVE-2023-45289

<0.7.7-r11
  • L
GHSA-32ch-6x54-q4h9

<0.7.7-r11
  • L
CVE-2024-24783

<0.7.7-r11
  • L
GHSA-j6m3-gc37-6r6q

<0.7.7-r11
  • L
GHSA-rr6r-cfgf-gc6h

<0.7.7-r11
  • L
GHSA-3q2c-pvp5-3cqp

<0.7.7-r11
  • L
CVE-2024-24784

<0.7.7-r11
  • L
CVE-2024-24785

<0.7.7-r11
  • L
CVE-2023-45290

<0.7.7-r11
  • L
GHSA-9f76-wg39-x86h

<0.7.7-r10
  • M
CVE-2023-39326

<0.7.7-r10
  • H
CVE-2023-45285

<0.7.7-r10
  • L
GHSA-5f94-vhjq-rpg8

<0.7.7-r10