nodejs20-full-i18n

Direct Vulnerabilities

Known vulnerabilities in the nodejs20-full-i18n package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Direct Request ('Forced Browsing')

<1:20.20.2-1.amzn2023.0.1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<1:20.20.2-1.amzn2023.0.1
  • H
Reversible One-Way Hash

<1:20.20.2-1.amzn2023.0.1
  • H
Incorrect Execution-Assigned Permissions

<1:20.20.2-1.amzn2023.0.1
  • H
Missing Release of Resource after Effective Lifetime

<1:20.20.2-1.amzn2023.0.1
  • H
Information Exposure

<1:20.20.2-1.amzn2023.0.1
  • H
Allocation of Resources Without Limits or Throttling

<1:20.20.1-1.amzn2023.0.3
  • H
Uncaught Exception

<1:20.20.1-1.amzn2023.0.3
  • H
HTTP Request Smuggling

<1:20.20.1-1.amzn2023.0.3
  • H
Uncaught Exception

<1:20.20.1-1.amzn2023.0.3
  • H
CRLF Injection

<1:20.20.1-1.amzn2023.0.3
  • H
Directory Traversal

<1:20.20.1-1.amzn2023.0.2
  • H
Directory Traversal

<1:20.20.1-1.amzn2023.0.2
  • H
Inefficient Regular Expression Complexity

<1:20.20.1-1.amzn2023.0.2
  • H
Time-of-check Time-of-use (TOCTOU)

<1:20.20.0-1.amzn2023.0.2
  • H
Directory Traversal

<1:20.20.0-1.amzn2023.0.2
  • H
Improper Preservation of Permissions

<1:20.20.0-1.amzn2023.0.1
  • H
Improper Preservation of Permissions

<1:20.20.0-1.amzn2023.0.1
  • H
Uncaught Exception

<1:20.20.0-1.amzn2023.0.1
  • H
Allocation of Resources Without Limits or Throttling

<1:20.20.0-1.amzn2023.0.1
  • H
Exposure of System Data to an Unauthorized Control Sphere

<1:20.20.0-1.amzn2023.0.1
  • H
Uncaught Exception

<1:20.20.0-1.amzn2023.0.1
  • M
Use After Free

<1:20.19.5-1.amzn2023.0.2
  • H
HTTP Request Smuggling

<1:20.19.2-1.amzn2023.0.1
  • H
Memory Leak

<1:20.19.2-1.amzn2023.0.1
  • H
Uncaught Exception

<1:20.19.2-1.amzn2023.0.1
  • H
Memory Leak

<1:20.19.2-1.amzn2023.0.1
  • M
Use After Free

<1:20.19.0-1.amzn2023.0.1
  • H
Resource Exhaustion

<1:20.18.2-1.amzn2023.0.1
  • H
Incorrect Authorization

<1:20.18.2-1.amzn2023.0.1
  • H
Use of Insufficiently Random Values

<1:20.18.2-1.amzn2023.0.1
  • M
Inefficient Regular Expression Complexity

<1:20.18.1-1.amzn2023.0.1
  • M
Incorrect Permission Assignment for Critical Resource

<1:20.18.0-1.amzn2023.0.2
  • M
Resource Exhaustion

<1:20.18.0-1.amzn2023.0.2
  • M
CVE-2024-22018

<1:20.18.0-1.amzn2023.0.2
  • M
CVE-2024-22020

<1:20.18.0-1.amzn2023.0.2
  • H
HTTP Request Smuggling

<1:20.12.2-1.amzn2023.0.2
  • H
Improper Access Control

<1:20.12.2-1.amzn2023.0.2
  • H
Detection of Error Condition Without Action

<1:20.12.2-1.amzn2023.0.2
  • H
Resource Exhaustion

<1:20.12.2-1.amzn2023.0.2
  • M
Buffer Under-read

<1:20.11.1-1.amzn2023.0.2
  • H
Resource Exhaustion

<1:20.11.1-1.amzn2023.0.1
  • H
Arbitrary Code Injection

<1:20.11.1-1.amzn2023.0.1
  • H
Incomplete Documentation

<1:20.11.1-1.amzn2023.0.1
  • H
Directory Traversal

<1:20.11.1-1.amzn2023.0.1
  • H
Information Exposure

<1:20.11.1-1.amzn2023.0.1
  • H
Improper Privilege Management

<1:20.11.1-1.amzn2023.0.1
  • H
Directory Traversal

<1:20.11.1-1.amzn2023.0.1
  • H
Resource Exhaustion

<1:20.11.1-1.amzn2023.0.1