nodejs-packaging vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the nodejs-packaging package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Resource Exhaustion

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • M
Incorrect Permission Assignment for Critical Resource

<0:2021.06-4.module+el9.3.0+19518+63aad52d
  • M
CVE-2024-22018

<0:2021.06-4.module+el9.3.0+19518+63aad52d
  • M
CVE-2024-22020

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • H
Detection of Error Condition Without Action

<0:2021.06-4.module+el9.3.0+19518+63aad52d
  • H
Resource Exhaustion

<0:2021.06-4.module+el9.3.0+19518+63aad52d
  • H
HTTP Request Smuggling

<0:2021.06-4.module+el9.3.0+19518+63aad52d
  • H
Buffer Under-read

<0:2021.06-4.module+el9.3.0+19518+63aad52d
  • H
Resource Exhaustion

<0:2021.06-4.module+el9.3.0+19518+63aad52d
  • H
Improper Privilege Management

<0:2021.06-4.module+el9.3.0+19518+63aad52d
  • H
Directory Traversal

<0:2021.06-4.module+el9.3.0+19518+63aad52d
  • H
Directory Traversal

<0:2021.06-4.module+el9.3.0+19518+63aad52d
  • H
Incomplete Documentation

<0:2021.06-4.module+el9.3.0+19518+63aad52d
  • H
Resource Exhaustion

<0:2021.06-4.module+el9.3.0+19518+63aad52d
  • H
Arbitrary Code Injection

<0:2021.06-4.module+el9.3.0+19518+63aad52d
  • H
Covert Timing Channel

<0:2021.06-4.module+el9.3.0+19518+63aad52d
  • H
Directory Traversal

<0:2021.06-4.module+el9.3.0+19518+63aad52d
  • H
Information Exposure

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • H
Improper Validation of Integrity Check Value

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • H
Arbitrary Code Injection

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • H
Resource Exhaustion

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • H
Arbitrary Code Injection

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • H
Information Exposure

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • H
Information Exposure

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • H
Inefficient Regular Expression Complexity

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • M
CVE-2023-30588

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • M
CVE-2023-30589

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • M
CVE-2023-30581

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • M
CVE-2023-30590

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • H
Out-of-bounds Write

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • H
Use of Insufficiently Random Values

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • H
Resource Exhaustion

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • H
Use of Insufficiently Random Values

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • M
Inefficient Regular Expression Complexity

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • M
CRLF Injection

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • M
Untrusted Search Path

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • M
CVE-2023-23919

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • M
Incorrect Authorization

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • M
Improper Input Validation

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • M
Inefficient Regular Expression Complexity

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • M
Resource Exhaustion

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • M
Reliance on Reverse DNS Resolution for a Security-Critical Action

<0:2021.06-4.module+el9.1.0+15718+e52ec601
  • M
Inefficient Regular Expression Complexity

<0:2021.06-4.module+el9.1.0+15718+e52ec601