nodejs:20/nodejs/.../nodejs vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the nodejs:20/nodejs package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Detection of Error Condition Without Action

<1:20.12.2-2.module+el9.4.0+21731+46b5b8a7
  • H
Resource Exhaustion

<1:20.12.2-2.module+el9.4.0+21731+46b5b8a7
  • H
HTTP Request Smuggling

<1:20.12.2-2.module+el9.4.0+21731+46b5b8a7
  • H
Buffer Under-read

<1:20.12.2-2.module+el9.4.0+21731+46b5b8a7
  • H
Resource Exhaustion

<1:20.12.2-2.module+el9.4.0+21731+46b5b8a7
  • H
Resource Exhaustion

<1:20.11.1-1.module+el9.3.0+21385+bac43d5a
  • H
Improper Privilege Management

<1:20.11.1-1.module+el9.3.0+21385+bac43d5a
  • H
Directory Traversal

<1:20.11.1-1.module+el9.3.0+21385+bac43d5a
  • H
Arbitrary Code Injection

<1:20.11.1-1.module+el9.3.0+21385+bac43d5a
  • H
Directory Traversal

<1:20.11.1-1.module+el9.3.0+21385+bac43d5a
  • H
Incomplete Documentation

<1:20.11.1-1.module+el9.3.0+21385+bac43d5a
  • H
Covert Timing Channel

<1:20.11.1-1.module+el9.3.0+21385+bac43d5a
  • M
Incorrect Permission Assignment for Critical Resource

<1:20.16.0-1.module+el9.4.0+22197+9e60f127
  • M
CVE-2024-22020

<1:20.16.0-1.module+el9.4.0+22197+9e60f127
  • M
CVE-2024-22018

<1:20.16.0-1.module+el9.4.0+22197+9e60f127
  • M
Incorrect Permission Assignment for Critical Resource

<1:20.16.0-1.module+el9.4.0+22197+9e60f127
  • M
CVE-2024-22020

<1:20.16.0-1.module+el9.4.0+22197+9e60f127
  • M
CVE-2024-22018

<1:20.16.0-1.module+el9.4.0+22197+9e60f127
  • H
HTTP Request Smuggling

<1:20.12.2-2.module+el9.4.0+21731+46b5b8a7
  • H
Detection of Error Condition Without Action

<1:20.12.2-2.module+el9.4.0+21731+46b5b8a7
  • H
Resource Exhaustion

<1:20.12.2-2.module+el9.4.0+21731+46b5b8a7
  • H
Resource Exhaustion

<1:20.12.2-2.module+el9.4.0+21731+46b5b8a7
  • H
Buffer Under-read

<1:20.12.2-2.module+el9.4.0+21731+46b5b8a7
  • H
Improper Privilege Management

<1:20.11.1-1.module+el9.3.0+21385+bac43d5a
  • H
Incomplete Documentation

<1:20.11.1-1.module+el9.3.0+21385+bac43d5a
  • H
Directory Traversal

<1:20.11.1-1.module+el9.3.0+21385+bac43d5a
  • H
Directory Traversal

<1:20.11.1-1.module+el9.3.0+21385+bac43d5a
  • H
Resource Exhaustion

<1:20.11.1-1.module+el9.3.0+21385+bac43d5a
  • H
Arbitrary Code Injection

<1:20.11.1-1.module+el9.3.0+21385+bac43d5a
  • H
Covert Timing Channel

<1:20.11.1-1.module+el9.3.0+21385+bac43d5a
  • L
Information Exposure

*
  • M
Improper Validation of Integrity Check Value

*
  • H
Directory Traversal

<1:20.9.0-1.module+el9.3.0.z+20633+3a660725