nodejs-current vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the nodejs-current package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Information Exposure

<20.8.1-r0
  • M
HTTP Request Smuggling

<18.9.1-r0
  • H
Directory Traversal

<20.8.1-r0
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<17.3.1-r0
  • H
OS Command Injection

<18.6.0-r0
  • C
Improper Input Validation

<16.6.2-r0
  • M
Improper Certificate Validation

<16.6.2-r0
  • M
Improper Input Validation

<9.10.0-r0
  • L
CVE-2023-39333

<20.8.1-r0
  • L
Information Exposure

<9.2.1-r0
  • C
CVE-2017-15896

<9.2.1-r0
  • C
Directory Traversal

<20.8.1-r0
  • H
Resource Exhaustion

<15.3.0-r0
  • H
Resource Exhaustion

<14.11.0-r0
  • C
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

<18.9.1-r0
  • C
HTTP Request Smuggling

<13.11.0-r0
  • H
HTTP Request Smuggling

<14.11.0-r0
  • M
Improper Input Validation

<11.3.0-r0
  • H
Use After Free

<15.5.1-r0
  • C
CVE-2019-15606

<13.11.0-r0
  • H
Improper Certificate Validation

<13.11.0-r0
  • M
HTTP Request Smuggling

<15.5.1-r0
  • H
Insufficient Verification of Data Authenticity

<20.8.1-r0
  • M
Uncontrolled Search Path Element

<18.9.1-r0
  • M
Improper Certificate Validation

<17.3.1-r0
  • H
Improper Certificate Validation

<17.3.1-r0
  • M
Improper Certificate Validation

<17.3.1-r0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<11.3.0-r0
  • H
Authentication Bypass

<9.10.0-r0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<11.3.0-r0
  • H
Improper Input Validation

<9.10.0-r0
  • M
HTTP Request Smuggling

<18.6.0-r0
  • M
HTTP Request Smuggling

<16.11.1-r0
  • L
CVE-2024-27983

<21.7.2-r0
  • L
CVE-2024-27982

<21.7.2-r0
  • M
HTTP Request Smuggling

<18.9.1-r0
  • H
Integer Underflow

<14.4.0-r0
  • M
Cross-site Scripting (XSS)

<16.6.2-r0
  • H
Resource Exhaustion

<11.3.0-r0
  • H
Resource Exhaustion

<11.3.0-r0
  • H
Allocation of Resources Without Limits or Throttling

<11.10.1-r0
  • H
CVE-2021-22884

<15.10.0-r0
  • M
HTTP Request Smuggling

<16.11.1-r0
  • C
Use After Free

<16.6.0-r0
  • H
Resource Exhaustion

<15.10.0-r0
  • M
HTTP Request Smuggling

<18.9.1-r0
  • H
Improper Enforcement of Message or Data Structure

<14.4.0-r0
  • H
Improper Certificate Validation

<14.4.0-r0