nodejs:10/nodejs-packaging vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the nodejs:10/nodejs-packaging package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Resource Exhaustion

<0:17-3.module_el8.4.0+2224+b07ac28e
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:17-3.module_el8.4.0+2224+b07ac28e
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:17-3.module_el8.4.0+2224+b07ac28e
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:17-3.module_el8.4.0+2224+b07ac28e
  • H
Improper Certificate Validation

<0:17-3.module_el8.4.0+2521+c668cc9f
  • M
Buffer Overflow

<0:17-3.module_el8.4.0+2224+b07ac28e
  • M
HTTP Request Smuggling

<0:17-3.module_el8.4.0+2224+b07ac28e
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:17-3.module_el8.4.0+2224+b07ac28e
  • M
Information Exposure Through Log Files

<0:17-3.module_el8.4.0+2224+b07ac28e
  • H
Allocation of Resources Without Limits or Throttling

<0:17-3.module_el8.4.0+2224+b07ac28e
  • H
Allocation of Resources Without Limits or Throttling

<0:17-3.module_el8.4.0+2224+b07ac28e
  • H
Allocation of Resources Without Limits or Throttling

<0:17-3.module_el8.4.0+2224+b07ac28e
  • H
Allocation of Resources Without Limits or Throttling

<0:17-3.module_el8.4.0+2224+b07ac28e
  • H
Resource Exhaustion

<0:17-3.module_el8.4.0+2224+b07ac28e
  • H
Allocation of Resources Without Limits or Throttling

<0:17-3.module_el8.4.0+2224+b07ac28e
  • H
Improper Privilege Management

<0:17-3.module_el8.4.0+2224+b07ac28e
  • H
Directory Traversal

<0:17-3.module_el8.4.0+2224+b07ac28e
  • H
Symlink Following

<0:17-3.module_el8.4.0+2224+b07ac28e
  • H
CVE-2019-15606

<0:17-3.module_el8.4.0+2224+b07ac28e
  • H
HTTP Request Smuggling

<0:17-3.module_el8.4.0+2224+b07ac28e
  • H
Improper Certificate Validation

<0:17-3.module_el8.4.0+2224+b07ac28e
  • H
Integer Underflow

<0:17-3.module_el8.4.0+2521+c668cc9f
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:17-3.module_el8.4.0+2521+c668cc9f
  • H
Improper Enforcement of Message or Data Structure

<0:17-3.module_el8.4.0+2521+c668cc9f
  • H
Integer Overflow or Wraparound

<0:17-3.module_el8.4.0+2224+b07ac28e
  • H
Allocation of Resources Without Limits or Throttling

<0:17-3.module_el8.4.0+2224+b07ac28e
  • H
CVE-2019-9513

<0:17-3.module_el8.4.0+2224+b07ac28e
  • H
Allocation of Resources Without Limits or Throttling

<0:17-3.module_el8.4.0+2224+b07ac28e
  • M
HTTP Request Smuggling

<0:17-3.module_el8.4.0+2224+b07ac28e
  • M
Use After Free

<0:17-3.module_el8.4.0+2224+b07ac28e
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:17-3.module_el8.4.0+2224+b07ac28e
  • M
CVE-2020-7754

<0:17-3.module_el8.4.0+2224+b07ac28e
  • M
Resource Exhaustion

<0:17-3.module_el8.4.0+2224+b07ac28e
  • M
Arbitrary Argument Injection

<0:17-3.module_el8.4.0+2224+b07ac28e
  • M
Improper Input Validation

<0:17-3.module_el8.4.0+2224+b07ac28e
  • H
CVE-2021-22884

<0:17-3.module_el8.3.0+2023+d2377ea3
  • H
Missing Release of Resource after Effective Lifetime

<0:17-3.module_el8.3.0+2023+d2377ea3