nodejs:22/nodejs-libs

Direct Vulnerabilities

Known vulnerabilities in the nodejs:22/nodejs-libs package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Uncaught Exception

<1:22.22.0-1.module+el9.6.0+23985+21730e4b
  • H
Allocation of Resources Without Limits or Throttling

<1:22.22.0-1.module+el9.6.0+23985+21730e4b
  • H
Uncaught Exception

<1:22.22.0-1.module+el9.6.0+23985+21730e4b
  • H
Allocation of Resources Without Limits or Throttling

<1:22.22.0-1.module+el9.6.0+23985+21730e4b
  • H
Uncaught Exception

<1:22.22.0-1.module+el9.6.0+23985+21730e4b
  • H
Allocation of Resources Without Limits or Throttling

<1:22.22.0-1.module+el9.6.0+23985+21730e4b
  • M
Unchecked Input for Loop Condition

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Executable Regular Expression Error

*
  • H
Reachable Assertion

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Directory Traversal

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • H
Uncaught Exception

*
  • M
Directory Traversal

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
CRLF Injection

*
  • M
HTTP Request Smuggling

*
  • H
Uncaught Exception

*
  • L
Use of Uninitialized Resource

*
  • H
Uncaught Exception

<1:22.22.0-1.module+el9.6.0+23985+21730e4b
  • H
Exposure of System Data to an Unauthorized Control Sphere

<1:22.22.0-1.module+el9.6.0+23985+21730e4b
  • H
Improper Preservation of Permissions

<1:22.22.0-1.module+el9.6.0+23985+21730e4b
  • H
Uncaught Exception

<1:22.22.0-1.module+el9.6.0+23985+21730e4b
  • H
Exposure of System Data to an Unauthorized Control Sphere

<1:22.22.0-1.module+el9.6.0+23985+21730e4b
  • H
Improper Preservation of Permissions

<1:22.22.0-1.module+el9.6.0+23985+21730e4b
  • H
Uncaught Exception

<1:22.22.0-1.module+el9.6.0+23985+21730e4b
  • H
Exposure of System Data to an Unauthorized Control Sphere

<1:22.22.0-1.module+el9.6.0+23985+21730e4b
  • H
Improper Preservation of Permissions

<1:22.22.0-1.module+el9.6.0+23985+21730e4b
  • H
Uncaught Exception

<1:22.22.0-1.module+el9.7.0+23896+b5802de9
  • H
Allocation of Resources Without Limits or Throttling

<1:22.22.0-1.module+el9.7.0+23896+b5802de9
  • H
Uncaught Exception

<1:22.22.0-1.module+el9.7.0+23896+b5802de9
  • H
Improper Preservation of Permissions

<1:22.22.0-1.module+el9.7.0+23896+b5802de9
  • H
Exposure of System Data to an Unauthorized Control Sphere

<1:22.22.0-1.module+el9.7.0+23896+b5802de9
  • H
Improper Preservation of Permissions

<1:22.22.0-1.module+el9.7.0+23896+b5802de9
  • H
Uncaught Exception

<1:22.22.0-1.module+el9.7.0+23896+b5802de9
  • H
Allocation of Resources Without Limits or Throttling

<1:22.22.0-1.module+el9.7.0+23896+b5802de9
  • H
Uncaught Exception

<1:22.22.0-1.module+el9.7.0+23896+b5802de9
  • H
Improper Preservation of Permissions

<1:22.22.0-1.module+el9.7.0+23896+b5802de9
  • H
Exposure of System Data to an Unauthorized Control Sphere

<1:22.22.0-1.module+el9.7.0+23896+b5802de9
  • H
Improper Preservation of Permissions

<1:22.22.0-1.module+el9.7.0+23896+b5802de9
  • H
Link Following

*
  • H
Exposure of System Data to an Unauthorized Control Sphere

<1:22.22.0-1.module+el9.7.0+23896+b5802de9
  • H
Uncaught Exception

<1:22.22.0-1.module+el9.7.0+23896+b5802de9
  • H
Improper Preservation of Permissions

<1:22.22.0-1.module+el9.7.0+23896+b5802de9
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Improper Preservation of Permissions

<1:22.22.0-1.module+el9.7.0+23896+b5802de9
  • H
Allocation of Resources Without Limits or Throttling

<1:22.22.0-1.module+el9.7.0+23896+b5802de9
  • H
Uncaught Exception

<1:22.22.0-1.module+el9.7.0+23896+b5802de9
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • H
Directory Traversal

*
  • H
Time-of-check Time-of-use (TOCTOU)

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • M
Use After Free

*
  • M
OS Command Injection

*
  • H
Resource Exhaustion

<1:22.13.1-1.module+el9.5.0+22763+17233acb
  • H
Incorrect Authorization

<1:22.13.1-1.module+el9.5.0+22763+17233acb
  • H
Use of Insufficiently Random Values

<1:22.13.1-1.module+el9.5.0+22763+17233acb
  • H
Uncaught Exception

<1:22.16.0-1.module+el9.6.0+23151+b1496e9d
  • H
Memory Leak

<1:22.16.0-1.module+el9.6.0+23151+b1496e9d
  • H
Uncaught Exception

<1:22.16.0-1.module+el9.6.0+23151+b1496e9d
  • H
Memory Leak

<1:22.16.0-1.module+el9.6.0+23151+b1496e9d
  • H
Resource Exhaustion

<1:22.13.1-1.module+el9.5.0+22763+17233acb
  • H
Incorrect Authorization

<1:22.13.1-1.module+el9.5.0+22763+17233acb
  • H
Use of Insufficiently Random Values

<1:22.13.1-1.module+el9.5.0+22763+17233acb
  • H
Numeric Truncation Error

<1:22.16.0-2.module+el9.6.0+23339+d3c8acfa
  • H
Numeric Truncation Error

<1:22.16.0-2.module+el9.6.0+23339+d3c8acfa
  • H
Heap-based Buffer Overflow

<1:22.15.0-1.module+el9.6.0+23062+9e7801b9
  • H
Use After Free

<1:22.15.0-1.module+el9.6.0+23062+9e7801b9
  • H
Heap-based Buffer Overflow

<1:22.15.0-1.module+el9.6.0+23062+9e7801b9
  • H
Use After Free

<1:22.15.0-1.module+el9.6.0+23062+9e7801b9
  • H
Resource Exhaustion

<1:22.13.1-1.module+el9.5.0+22763+17233acb
  • H
Incorrect Authorization

<1:22.13.1-1.module+el9.5.0+22763+17233acb
  • H
Use of Insufficiently Random Values

<1:22.13.1-1.module+el9.5.0+22763+17233acb
  • H
Numeric Truncation Error

<1:22.16.0-2.module+el9.6.0+23339+d3c8acfa
  • H
Heap-based Buffer Overflow

<1:22.15.0-1.module+el9.6.0+23062+9e7801b9
  • H
Use After Free

<1:22.15.0-1.module+el9.6.0+23062+9e7801b9
  • H
Uncaught Exception

<1:22.16.0-1.module+el9.6.0+23151+b1496e9d
  • H
Memory Leak

<1:22.16.0-1.module+el9.6.0+23151+b1496e9d
  • H
Heap-based Buffer Overflow

<1:22.15.0-1.module+el9.6.0+23062+9e7801b9
  • H
Use After Free

<1:22.15.0-1.module+el9.6.0+23062+9e7801b9
  • H
Resource Exhaustion

<1:22.13.1-1.module+el9.5.0+22763+17233acb
  • H
Incorrect Authorization

<1:22.13.1-1.module+el9.5.0+22763+17233acb
  • H
Use of Insufficiently Random Values

<1:22.13.1-1.module+el9.5.0+22763+17233acb
  • H
Numeric Truncation Error

<1:22.16.0-2.module+el9.6.0+23339+d3c8acfa
  • H
Uncaught Exception

<1:22.16.0-1.module+el9.6.0+23151+b1496e9d
  • H
Memory Leak

<1:22.16.0-1.module+el9.6.0+23151+b1496e9d
  • M
Integer Overflow or Wraparound

*
  • H
Numeric Truncation Error

<1:22.16.0-2.module+el9.6.0+23339+d3c8acfa
  • H
Numeric Truncation Error

<1:22.16.0-2.module+el9.6.0+23339+d3c8acfa
  • L
Inefficient Regular Expression Complexity

*
  • L
Inefficient Regular Expression Complexity

*
  • H
Memory Leak

<1:22.16.0-1.module+el9.6.0+23151+b1496e9d
  • H
Uncaught Exception

<1:22.16.0-1.module+el9.6.0+23151+b1496e9d
  • H
Uncaught Exception

<1:22.16.0-1.module+el9.6.0+23151+b1496e9d
  • H
Memory Leak

<1:22.16.0-1.module+el9.6.0+23151+b1496e9d
  • L
Memory Leak

*
  • H
Heap-based Buffer Overflow

<1:22.15.0-1.module+el9.6.0+23062+9e7801b9
  • H
Use After Free

<1:22.15.0-1.module+el9.6.0+23062+9e7801b9
  • H
Heap-based Buffer Overflow

<1:22.15.0-1.module+el9.6.0+23062+9e7801b9
  • M
Integer Overflow or Wraparound

*
  • H
Use After Free

<1:22.15.0-1.module+el9.6.0+23062+9e7801b9
  • H
Resource Exhaustion

<1:22.13.1-1.module+el9.5.0+22763+17233acb
  • H
Incorrect Authorization

<1:22.13.1-1.module+el9.5.0+22763+17233acb
  • H
Use of Insufficiently Random Values

<1:22.13.1-1.module+el9.5.0+22763+17233acb
  • H
Use of Insufficiently Random Values

<1:22.13.1-1.module+el9.5.0+22763+17233acb
  • H
Incorrect Authorization

<1:22.13.1-1.module+el9.5.0+22763+17233acb
  • H
Resource Exhaustion

<1:22.13.1-1.module+el9.5.0+22763+17233acb