io.atomix:atomix-cluster@3.1.0-beta2 vulnerabilities
-
latest version
3.1.12
-
first published
6 years ago
-
latest version published
2 years ago
-
licenses detected
- [2.1.0-beta1,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the io.atomix:atomix-cluster package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Access Restriction Bypass by allowing unauthorized How to fix Access Restriction Bypass? There is no fixed version for |
[0,)
|
Affected versions of this package are vulnerable to Information Exposure when a malicious Atomix node queries distributed variable primitives which contain the entire primitive lists that How to fix Information Exposure? There is no fixed version for |
[0,)
|
Affected versions of this package are vulnerable to Denial of Service (DoS) via a Raft session flooding attack using Raft OpenSessionRequest messages. How to fix Denial of Service (DoS)? There is no fixed version for |
[0,)
|
Affected versions of this package are vulnerable to Denial of Service (DoS) via false link event messages sent to a master ONOS node. How to fix Denial of Service (DoS)? There is no fixed version for |
[0,)
|
Affected versions of this package are vulnerable to Improper Access Control by allowing a malicious How to fix Improper Access Control? There is no fixed version for |
[0,)
|
Affected versions of this package are vulnerable to Access Restriction Bypass by allowing unauthorized Atomix nodes to become the lead node in a target cluster via manipulation of the variable terms in RaftContext. How to fix Access Restriction Bypass? There is no fixed version for |
[0,)
|
Affected versions of this package are vulnerable to Denial of Service (DoS) via false How to fix Denial of Service (DoS)? Upgrade |
[,3.1.6)
|