nodejs-current vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the nodejs-current package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • C
Directory Traversal

<20.8.1-r0
  • C
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

<18.9.1-r0
  • M
Improper Certificate Validation

<16.6.2-r0
  • M
HTTP Request Smuggling

<18.9.1-r0
  • M
Cross-site Scripting (XSS)

<16.6.2-r0
  • C
Use After Free

<16.6.0-r0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<11.3.0-r0
  • C
CVE-2019-15606

<13.11.0-r0
  • H
Authentication Bypass

<9.10.0-r0
  • L
CVE-2024-27982

<21.7.2-r0
  • M
HTTP Request Smuggling

<18.9.1-r0
  • L
CVE-2024-27983

<21.7.2-r0
  • H
Improper Input Validation

<9.10.0-r0
  • L
Information Exposure

<20.8.1-r0
  • H
Directory Traversal

<20.8.1-r0
  • H
OS Command Injection

<18.6.0-r0
  • M
HTTP Request Smuggling

<15.5.1-r0
  • H
Use After Free

<15.5.1-r0
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<17.3.1-r0
  • H
Resource Exhaustion

<15.3.0-r0
  • M
Improper Certificate Validation

<17.3.1-r0
  • H
CVE-2021-22884

<15.10.0-r0
  • M
Uncontrolled Search Path Element

<18.9.1-r0
  • H
Integer Underflow

<14.4.0-r0
  • M
Improper Input Validation

<11.3.0-r0
  • H
Resource Exhaustion

<11.3.0-r0
  • M
Improper Certificate Validation

<17.3.1-r0
  • M
HTTP Request Smuggling

<16.11.1-r0
  • M
HTTP Request Smuggling

<16.11.1-r0
  • H
Improper Certificate Validation

<17.3.1-r0
  • H
Improper Enforcement of Message or Data Structure

<14.4.0-r0
  • H
Resource Exhaustion

<15.10.0-r0
  • L
Information Exposure

<9.2.1-r0
  • H
Resource Exhaustion

<11.3.0-r0
  • H
Resource Exhaustion

<14.11.0-r0
  • H
HTTP Request Smuggling

<14.11.0-r0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<11.3.0-r0
  • M
Improper Input Validation

<9.10.0-r0
  • H
Insufficient Verification of Data Authenticity

<20.8.1-r0
  • H
Allocation of Resources Without Limits or Throttling

<11.10.1-r0
  • M
HTTP Request Smuggling

<18.9.1-r0
  • C
CVE-2017-15896

<9.2.1-r0
  • L
CVE-2023-39333

<20.8.1-r0
  • M
HTTP Request Smuggling

<18.6.0-r0
  • C
Improper Input Validation

<16.6.2-r0
  • H
Improper Certificate Validation

<13.11.0-r0
  • H
Improper Certificate Validation

<14.4.0-r0
  • C
HTTP Request Smuggling

<13.11.0-r0