3.1.12
6 years ago
2 years ago
Known vulnerabilities in the io.atomix:atomix-cluster package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Access Restriction Bypass by allowing unauthorized How to fix Access Restriction Bypass? There is no fixed version for | [0,) |
Affected versions of this package are vulnerable to Information Exposure when a malicious Atomix node queries distributed variable primitives which contain the entire primitive lists that How to fix Information Exposure? There is no fixed version for | [0,) |
Affected versions of this package are vulnerable to Denial of Service (DoS) via a Raft session flooding attack using Raft OpenSessionRequest messages. How to fix Denial of Service (DoS)? There is no fixed version for | [0,) |
Affected versions of this package are vulnerable to Denial of Service (DoS) via false link event messages sent to a master ONOS node. How to fix Denial of Service (DoS)? There is no fixed version for | [0,) |
Affected versions of this package are vulnerable to Improper Access Control by allowing a malicious How to fix Improper Access Control? There is no fixed version for | [0,) |
Affected versions of this package are vulnerable to Access Restriction Bypass by allowing unauthorized Atomix nodes to become the lead node in a target cluster via manipulation of the variable terms in RaftContext. How to fix Access Restriction Bypass? There is no fixed version for | [0,) |
Affected versions of this package are vulnerable to Denial of Service (DoS) via false How to fix Denial of Service (DoS)? Upgrade | [,3.1.6) |