cesanta/mongoose

Licenses: GPL-2.0 | MIT

Direct Vulnerabilities

Known vulnerabilities in the https://github.com|cesanta/mongoose package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Authorization Bypass Through User-Controlled Key

[,7.21)
  • M
Stack-based Buffer Overflow

[,7.21)
  • M
Heap-based Buffer Overflow

[,7.21)
  • H
Insecure Default Initialization of Resource

[,7.0)
  • M
Improper Verification of Source of a Communication Channel

[,7.21)
  • M
Generation of Predictable Numbers or Identifiers

[,7.21)
  • M
Improper Verification of Cryptographic Signature

[,7.21)
  • H
NULL Pointer Dereference

[,7.2)
  • H
Integer Overflow or Wraparound

[,7.18)
  • M
Improper Neutralization

[,7.15)
  • M
Use of Out-of-range Pointer Offset

[,7.15)
  • M
Use of Out-of-range Pointer Offset

[0,)
  • H
Integer Overflow or Wraparound

[0,)
  • M
Use of Out-of-range Pointer Offset

[,7.15)
  • L
Use of Out-of-range Pointer Offset

[0,)
  • M
Use of Out-of-range Pointer Offset

[0,)
  • M
Use of Out-of-range Pointer Offset

[0,)
  • H
Use of Out-of-range Pointer Offset

[0,)
  • M
Improper Neutralization

[0,)
  • H
NULL Pointer Dereference

[0,)
  • H
Heap-based Buffer Overflow

[7.10,7.11)
  • H
Improper Handling of Length Parameter Inconsistency

[,7.10)
  • C
Arbitrary File Write

[,7.6)
  • C
Use After Free

[,6.14)
  • C
Use After Free

[,6.14)
  • H
Cross-site Request Forgery (CSRF)

[,6.9)
  • C
Out-of-bounds Write

[0,6.17)
  • C
Out-of-Bounds

[0,6.9)
  • C
Out-of-bounds Write

[6.7,7.0)
  • C
Use After Free

[0,6.8]
  • H
Out-of-bounds Read

[,6.12)
  • C
Out-of-bounds Read

[0,)
  • H
NULL Pointer Dereference

[0,6.8]
  • H
Denial of Service (DoS)

[0,6.8]
  • C
Integer Overflow or Wraparound

[0,6.8]
  • C
Out-of-bounds Write

[0,7.1)
  • C
Use After Free

[,6.14)
  • H
Use After Free

[,6.8)
  • C
Integer Overflow or Wraparound

[0,6.8]
  • C
Out-of-bounds Read

[0,)
  • H
Out-of-bounds Read

[0,6.16)
  • C
Use After Free

[,6.14)
  • C
Use After Free

[0,6.8]
  • M
Out-of-Bounds

[0,)
  • H
Out-of-bounds Read

[,6.9)
  • C
Out-of-bounds Write

[0,7.1)
  • H
Use After Free

[,6.14)
  • C
Out-of-bounds Write

[,6.15)