nodejs14-docs vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the nodejs14-docs package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2024-27983

<14.21.3-150200.15.58.1
  • M
CVE-2024-27982

<14.21.3-150200.15.58.1
  • M
Server-Side Request Forgery (SSRF)

<14.21.3-150200.15.55.1
  • M
CVE-2024-22025

<14.21.3-150200.15.55.1
  • H
CVE-2024-22019

<14.21.3-150200.15.55.1
  • M
CVE-2023-46809

<14.21.3-150200.15.55.1
  • H
CVE-2023-44487

<14.21.3-150200.15.52.2
  • M
Insufficient Verification of Data Authenticity

<14.21.3-150200.15.52.2
  • M
CVE-2023-32559

<14.21.3-150200.15.49.1
  • M
CVE-2023-32006

<14.21.3-150200.15.49.1
  • M
CVE-2023-32002

<14.21.3-150200.15.49.1
  • M
CVE-2023-30590

<14.21.3-150200.15.49.1
  • M
CVE-2023-30589

<14.21.3-150200.15.49.1
  • H
CVE-2023-30581

<14.21.3-150200.15.49.1
  • H
Inefficient Regular Expression Complexity

<14.21.3-150200.15.46.1
  • H
Untrusted Search Path

<14.21.3-150200.15.43.1
  • M
Incorrect Authorization

<14.21.3-150200.15.43.1
  • M
HTTP Request Smuggling

<14.20.0-150200.15.34.1
  • M
HTTP Request Smuggling

<14.20.0-150200.15.34.1
  • H
OS Command Injection

<14.20.0-150200.15.34.1
  • M
HTTP Request Smuggling

<14.20.0-150200.15.34.1
  • H
OS Command Injection

<14.21.1-150200.15.40.2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<14.19.1-150200.15.31.1
  • M
Information Exposure

<14.19.1-150200.15.31.1
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<14.19.1-150200.15.31.1
  • L
CVE-2021-44907

<14.19.1-150200.15.31.1
  • M
HTTP Request Smuggling

<14.15.4-5.6.1
  • H
Use After Free

<14.15.4-5.6.1
  • H
Resource Exhaustion

<14.15.4-5.6.1
  • M
CVE-2021-22884

<14.16.0-5.9.1
  • H
Missing Release of Resource after Effective Lifetime

<14.16.0-5.9.1
  • M
Out-of-bounds Read

<14.17.2-5.12.1
  • H
CVE-2021-27290

<14.17.2-5.12.1
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<14.17.2-5.12.1
  • M
Inefficient Regular Expression Complexity

<14.17.2-5.12.1
  • H
Improper Input Validation

<14.17.5-5.15.5
  • C
Use After Free

<14.17.5-5.15.5
  • H
Cross-site Scripting (XSS)

<14.17.5-5.15.5
  • M
Improper Certificate Validation

<14.17.5-5.15.5
  • C
Use After Free

<14.17.5-5.15.5
  • H
Symlink Following

<14.18.1-15.21.2
  • H
Improper Handling of Case Sensitivity

<14.18.1-15.21.2
  • H
Directory Traversal

<14.18.1-15.21.2
  • M
HTTP Request Smuggling

<14.18.1-15.21.2
  • M
HTTP Request Smuggling

<14.18.1-15.21.2
  • H
Directory Traversal

<14.18.1-15.21.2
  • H
Directory Traversal

<14.18.1-15.21.2
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<14.19.0-15.27.1
  • H
Inefficient Regular Expression Complexity

<14.19.0-15.27.1
  • H
Directory Traversal

<14.19.0-15.27.1
  • H
Link Following

<14.19.0-15.27.1
  • M
CVE-2021-23343

<14.19.0-15.27.1