nodejs-devel

Direct Vulnerabilities

Known vulnerabilities in the nodejs-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Inefficient Regular Expression Complexity

<1:22.22.2-1.module+el9.7.0+24157+8ddb2461
  • H
Reachable Assertion

<1:22.22.2-1.module+el9.7.0+24157+8ddb2461
  • H
Inefficient Regular Expression Complexity

<1:22.22.2-1.module+el9.7.0+24157+8ddb2461
  • H
Allocation of Resources Without Limits or Throttling

<1:24.14.1-2.module+el9.7.0+24166+51c9666b
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

<1:22.22.2-1.module+el9.7.0+24157+8ddb2461
  • H
Uncaught Exception

<1:22.22.2-1.module+el9.7.0+24157+8ddb2461
  • H
Reversible One-Way Hash

<1:24.14.1-2.module+el9.7.0+24166+51c9666b
  • H
Incorrect Execution-Assigned Permissions

<1:24.14.1-2.module+el9.7.0+24166+51c9666b
  • H
Direct Request ('Forced Browsing')

<1:24.14.1-2.module+el9.7.0+24166+51c9666b
  • H
Missing Release of Resource after Effective Lifetime

<1:24.14.1-2.module+el9.7.0+24166+51c9666b
  • H
Information Exposure

<1:24.14.1-2.module+el9.7.0+24166+51c9666b
  • H
Improper Handling of Inconsistent Special Elements

<1:24.14.1-2.module+el9.7.0+24166+51c9666b
  • H
Improper Verification of Source of a Communication Channel

<1:24.14.1-2.module+el9.7.0+24166+51c9666b
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<1:22.22.2-1.module+el9.7.0+24157+8ddb2461
  • H
Uncaught Exception

<1:22.22.2-1.module+el9.7.0+24157+8ddb2461
  • H
CRLF Injection

<1:24.14.1-2.module+el9.7.0+24166+51c9666b
  • H
Allocation of Resources Without Limits or Throttling

<1:22.22.2-1.module+el9.7.0+24157+8ddb2461
  • H
HTTP Request Smuggling

<1:22.22.2-1.module+el9.7.0+24157+8ddb2461
  • H
Uncaught Exception

<1:24.14.1-2.module+el9.7.0+24166+51c9666b
  • H
Allocation of Resources Without Limits or Throttling

<1:24.13.0-1.module+el9.7.0+23894+c8377628
  • H
Uncaught Exception

<1:24.13.0-1.module+el9.7.0+23894+c8377628
  • H
Improper Preservation of Permissions

<1:24.13.0-1.module+el9.7.0+23894+c8377628
  • H
Exposure of System Data to an Unauthorized Control Sphere

<1:24.13.0-1.module+el9.7.0+23894+c8377628
  • H
Improper Preservation of Permissions

<1:24.13.0-1.module+el9.7.0+23894+c8377628
  • H
Numeric Truncation Error

<1:22.16.0-2.module+el9.6.0+23339+d3c8acfa
  • H
HTTP Request Smuggling

<1:20.19.2-1.module+el9.6.0+23146+be9976bd
  • H
Memory Leak

<1:20.19.2-1.module+el9.6.0+23146+be9976bd
  • H
Uncaught Exception

<1:20.19.2-1.module+el9.6.0+23146+be9976bd
  • H
Heap-based Buffer Overflow

<1:22.15.0-1.module+el9.6.0+23062+9e7801b9
  • M
Use After Free

<1:20.19.1-1.module+el9.6.0+23053+4195b0b2
  • M
Resource Exhaustion

<1:18.20.6-1.module+el9.5.0+22773+9a359385
  • H
Incorrect Authorization

<1:20.18.2-1.module+el9.5.0+22758+4ad2c198
  • M
Use of Insufficiently Random Values

<1:18.20.6-1.module+el9.5.0+22773+9a359385
  • M
Resource Exhaustion

<1:18.20.4-1.module+el9.4.0+22195+c221878e
  • M
Incorrect Permission Assignment for Critical Resource

<1:20.16.0-1.module+el9.4.0+22197+9e60f127
  • M
CVE-2024-22020

<1:18.20.4-1.module+el9.4.0+22195+c221878e
  • M
CVE-2024-22018

<1:20.16.0-1.module+el9.4.0+22197+9e60f127
  • H
Detection of Error Condition Without Action

<1:18.20.2-2.module+el9.4.0+21742+692df1ea
  • H
Resource Exhaustion

<1:18.20.2-2.module+el9.4.0+21742+692df1ea
  • H
HTTP Request Smuggling

<1:18.20.2-2.module+el9.4.0+21742+692df1ea
  • H
Buffer Under-read

<1:18.20.2-2.module+el9.4.0+21742+692df1ea
  • H
Resource Exhaustion

<1:18.20.2-2.module+el9.4.0+21742+692df1ea
  • H
Improper Privilege Management

<1:20.11.1-1.module+el9.3.0+21385+bac43d5a
  • H
Directory Traversal

<1:20.11.1-1.module+el9.3.0+21385+bac43d5a
  • H
Directory Traversal

<1:20.11.1-1.module+el9.3.0+21385+bac43d5a
  • H
Incomplete Documentation

<1:20.11.1-1.module+el9.3.0+21385+bac43d5a
  • H
Resource Exhaustion

<1:18.19.1-1.module+el9.3.0+21388+22892fb9
  • H
Arbitrary Code Injection

<1:18.19.1-1.module+el9.3.0+21388+22892fb9
  • H
Covert Timing Channel

<1:18.19.1-1.module+el9.3.0+21388+22892fb9
  • H
Directory Traversal

<1:20.8.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Information Exposure

<1:18.18.2-2.module+el9.2.0.z+20408+7cb5fda5
  • H
Improper Validation of Integrity Check Value

<1:18.18.2-2.module+el9.2.0.z+20408+7cb5fda5
  • H
Arbitrary Code Injection

<1:18.18.2-2.module+el9.2.0.z+20408+7cb5fda5
  • H
Resource Exhaustion

<1:18.18.2-2.module+el9.2.0.z+20408+7cb5fda5
  • H
Arbitrary Code Injection

<1:18.17.1-1.module+el9.2.0.z+19753+58118bc0
  • H
Information Exposure

<1:18.17.1-1.module+el9.2.0.z+19753+58118bc0
  • H
Information Exposure

<1:18.17.1-1.module+el9.2.0.z+19753+58118bc0
  • H
Inefficient Regular Expression Complexity

<1:18.17.1-1.module+el9.2.0.z+19753+58118bc0
  • M
CVE-2023-30588

<1:18.16.1-1.module+el9.2.0.z+19424+78951f07
  • M
CVE-2023-30589

<1:18.16.1-1.module+el9.2.0.z+19424+78951f07
  • M
CVE-2023-30581

<1:18.16.1-1.module+el9.2.0.z+19424+78951f07
  • M
CVE-2023-30590

<1:18.16.1-1.module+el9.2.0.z+19424+78951f07
  • H
Out-of-bounds Write

<1:18.14.2-3.module+el9.2.0.z+18964+42696395
  • H
Use of Insufficiently Random Values

<1:18.14.2-3.module+el9.2.0.z+18964+42696395
  • H
Resource Exhaustion

<1:18.14.2-3.module+el9.2.0.z+18964+42696395
  • H
Use of Insufficiently Random Values

<1:18.14.2-3.module+el9.2.0.z+18964+42696395
  • M
Inefficient Regular Expression Complexity

<1:18.14.2-2.module+el9.2.0.z+18497+a402347c
  • M
CRLF Injection

<1:18.14.2-2.module+el9.2.0.z+18497+a402347c
  • M
Untrusted Search Path

<1:18.14.2-2.module+el9.2.0.z+18497+a402347c
  • M
CVE-2023-23919

<1:18.14.2-2.module+el9.2.0.z+18497+a402347c
  • M
Incorrect Authorization

<1:18.14.2-2.module+el9.2.0.z+18497+a402347c
  • M
Improper Input Validation

<1:18.14.2-2.module+el9.2.0.z+18497+a402347c
  • M
Inefficient Regular Expression Complexity

<1:18.14.2-2.module+el9.2.0.z+18497+a402347c
  • M
Resource Exhaustion

<1:18.14.2-2.module+el9.2.0.z+18497+a402347c
  • M
Reliance on Reverse DNS Resolution for a Security-Critical Action

<1:18.12.1-1.module+el9.1.0.z+17326+318294bb
  • M
Inefficient Regular Expression Complexity

<1:18.12.1-1.module+el9.1.0.z+17326+318294bb