3.9.15
10 years ago
6 days ago
Known vulnerabilities in the electerm package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
electerm is an open-sourced terminal/ssh/telnet/serialport/sftp client Affected versions of this package are vulnerable to Use of Password Hash With Insufficient Computational Effort due to the How to fix Use of Password Hash With Insufficient Computational Effort? Upgrade | <3.9.5 |
electerm is an open-sourced terminal/ssh/telnet/serialport/sftp client Affected versions of this package are vulnerable to Improper Verification of Source of a Communication Channel via the How to fix Improper Verification of Source of a Communication Channel? Upgrade | >=3.0.6 <3.9.5 |
electerm is an open-sourced terminal/ssh/telnet/serialport/sftp client Affected versions of this package are vulnerable to Unsafe Dependency Resolution in the handling of protocol URLs or command-line options. An attacker can execute arbitrary local code by enticing a user to click a crafted How to fix Unsafe Dependency Resolution? Upgrade | >=3.0.6 <3.8.15 |
electerm is an open-sourced terminal/ssh/telnet/serialport/sftp client Affected versions of this package are vulnerable to Cleartext Storage of Sensitive Information in the How to fix Cleartext Storage of Sensitive Information? Upgrade | <3.9.5 |
electerm is an open-sourced terminal/ssh/telnet/serialport/sftp client Affected versions of this package are vulnerable to Open Redirect in the How to fix Open Redirect? There is no fixed version for | >=0.0.0 |