15.1.0
13 years ago
22 hours ago
Known vulnerabilities in the next package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
next is a react framework. Affected versions of this package are vulnerable to Uncontrolled Recursion through the image optimization feature. An attacker can cause excessive CPU consumption by exploiting this vulnerability. How to fix Uncontrolled Recursion? Upgrade | >=10.0.0 <14.2.7>=15.0.0-canary.0 <15.0.0-canary.109 |
next is a react framework. Affected versions of this package are vulnerable to Resource Exhaustion via the How to fix Resource Exhaustion? Upgrade | <13.4.20-canary.13 |
next is a react framework. Affected versions of this package are vulnerable to User Interface (UI) Misrepresentation of Critical Information due to improper CSP (content security policy). Note: In order to be affected ALL of the following must be true:
Not affected: The How to fix User Interface (UI) Misrepresentation of Critical Information? Upgrade | >=10.0.0 <12.1.0 |
next is a react framework. Affected versions of this package are vulnerable to Denial of Service (DoS) when a static asset is requested with a locale prefix. Note: This only affects users who are self-hosting their app and are using the internationalization functionality. How to fix Denial of Service (DoS)? Upgrade | >=12.0.0 <12.0.9 |
next is a react framework. Affected versions of this package are vulnerable to Denial of Service (DoS) due to mishandling of invalid URLs. Note: This vulnerability is only possible for Node.js versions of 15.0.0 and above. Also, deployments on Vercel (vercel.com) are not affected along with similar environments where invalid requests are filtered before reaching Next.js. How to fix Denial of Service (DoS)? Upgrade | >=12.0.0 <12.0.5>=11.1.0 <11.1.3 |