nodejs-current vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the nodejs-current package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2024-27983

<21.7.2-r0
  • L
CVE-2024-27982

<21.7.2-r0
  • L
CVE-2023-39333

<20.8.1-r0
  • H
HTTP Request Smuggling

<14.11.0-r0
  • M
HTTP Request Smuggling

<18.9.1-r0
  • L
Information Exposure

<20.8.1-r0
  • H
Resource Exhaustion

<11.3.0-r0
  • M
HTTP Request Smuggling

<18.9.1-r0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<11.3.0-r0
  • H
Authentication Bypass

<9.10.0-r0
  • M
HTTP Request Smuggling

<18.6.0-r0
  • M
HTTP Request Smuggling

<16.11.1-r0
  • M
HTTP Request Smuggling

<16.11.1-r0
  • C
Use After Free

<16.6.0-r0
  • M
HTTP Request Smuggling

<15.5.1-r0
  • H
Resource Exhaustion

<11.3.0-r0
  • M
Improper Input Validation

<9.10.0-r0
  • H
Improper Input Validation

<9.10.0-r0
  • H
Insufficient Verification of Data Authenticity

<20.8.1-r0
  • H
Directory Traversal

<20.8.1-r0
  • H
Use After Free

<15.5.1-r0
  • H
Improper Certificate Validation

<13.11.0-r0
  • C
Improper Input Validation

<16.6.2-r0
  • C
CVE-2019-15606

<13.11.0-r0
  • H
Integer Underflow

<14.4.0-r0
  • H
Resource Exhaustion

<15.10.0-r0
  • L
Information Exposure

<9.2.1-r0
  • C
CVE-2017-15896

<9.2.1-r0
  • M
HTTP Request Smuggling

<18.9.1-r0
  • M
Improper Certificate Validation

<17.3.1-r0
  • H
Resource Exhaustion

<15.3.0-r0
  • H
CVE-2021-22884

<15.10.0-r0
  • M
Improper Input Validation

<11.3.0-r0
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<17.3.1-r0
  • H
Improper Enforcement of Message or Data Structure

<14.4.0-r0
  • H
Improper Certificate Validation

<14.4.0-r0
  • C
Directory Traversal

<20.8.1-r0
  • C
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

<18.9.1-r0
  • H
OS Command Injection

<18.6.0-r0
  • M
Uncontrolled Search Path Element

<18.9.1-r0
  • M
Improper Certificate Validation

<16.6.2-r0
  • M
Improper Certificate Validation

<17.3.1-r0
  • H
Improper Certificate Validation

<17.3.1-r0
  • H
Resource Exhaustion

<14.11.0-r0
  • M
Cross-site Scripting (XSS)

<16.6.2-r0
  • C
HTTP Request Smuggling

<13.11.0-r0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<11.3.0-r0
  • H
Allocation of Resources Without Limits or Throttling

<11.10.1-r0