2.21.2
9 years ago
2 days ago
Known vulnerabilities in the signalk-server package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
signalk-server is an An implementation of a Signal K server for boats. Affected versions of this package are vulnerable to Directory Traversal via improper validation in the How to fix Directory Traversal? Upgrade | <2.20.3 |
signalk-server is an An implementation of a Signal K server for boats. Affected versions of this package are vulnerable to Authentication Bypass Using an Alternate Path or Channel via the How to fix Authentication Bypass Using an Alternate Path or Channel? Upgrade | <2.19.0-beta.5 |
signalk-server is an An implementation of a Signal K server for boats. Affected versions of this package are vulnerable to Arbitrary Code Injection via the How to fix Arbitrary Code Injection? Upgrade | <2.19.0-beta.5 |
signalk-server is an An implementation of a Signal K server for boats. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <2.19.0-beta.5 |
signalk-server is an An implementation of a Signal K server for boats. Affected versions of this package are vulnerable to Improper Control of Dynamically-Managed Code Resources via the How to fix Improper Control of Dynamically-Managed Code Resources? Upgrade | <2.19.0-beta.5 |
signalk-server is an An implementation of a Signal K server for boats. Affected versions of this package are vulnerable to Information Exposure via the exposed endpoints How to fix Information Exposure? Upgrade | <2.19.0-beta.5 |
signalk-server is an An implementation of a Signal K server for boats. Affected versions of this package are vulnerable to User Impersonation via the access request system. An attacker can obtain elevated privileges and impersonate trusted devices by submitting misleading descriptions, spoofing internal IP addresses through the How to fix User Impersonation? Upgrade | <2.19.0-beta.5 |