5.8.2
9 years ago
11 days ago
Known vulnerabilities in the fastify package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
fastify is an overhead web framework, for Node.js. Affected versions of this package are vulnerable to Interpretation Conflict via the Note: This vulnerability affects all Fastify users who rely on Content-Type-based body validation schemas to enforce data integrity or security constraints. How to fix Interpretation Conflict? Upgrade | <5.7.2 |
fastify is an overhead web framework, for Node.js. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the Note: Only applications that return a How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <5.7.3 |
fastify is an overhead web framework, for Node.js. Affected versions of this package are vulnerable to Denial of Service (DoS). A denial of service vulnerability exists in Fastify v2.14.1 and v3.0.0-rc.4 that allows A malicious user can trigger resource exhaustion (when the allErrors option is used) with specially crafted schemas. How to fix Denial of Service (DoS)? Upgrade | <2.15.1 |
fastify is an overhead web framework, for Node.js. Affected versions of this package are vulnerable to Denial of Service (DoS). It uses How to fix Denial of Service (DoS)? Upgrade | >=2.0.0 <2.15.1>=3.0.0-alpha.1 <3.0.0-rc.5 |