15.0.4
13 years ago
4 days ago
Known vulnerabilities in the next package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
next is a react framework. Affected versions of this package are vulnerable to Uncontrolled Recursion through the image optimization feature. An attacker can cause excessive CPU consumption by exploiting this vulnerability. How to fix Uncontrolled Recursion? Upgrade | >=10.0.0 <14.2.7>=15.0.0-canary.0 <15.0.0-canary.109 |
next is a react framework. Affected versions of this package are vulnerable to Denial of Service (DoS). An attacker can cause a crash by unspecified means, affecting the availability of the server. How to fix Denial of Service (DoS)? Upgrade | >=13.4.0 <13.5.0 |
next is a react framework. Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) through the Notes: Prerequisites:
How to fix Server-Side Request Forgery (SSRF)? Upgrade | >=13.4.0 <14.1.1 |
next is a react framework. Affected versions of this package are vulnerable to HTTP Request Smuggling due to the inconsistent interpretation of crafted Note: This patch includes Next.js 14.x. How to fix HTTP Request Smuggling? Upgrade | >=13.4.0 <13.5.1 |
next is a react framework. Affected versions of this package are vulnerable to Resource Exhaustion via the How to fix Resource Exhaustion? Upgrade | <13.4.20-canary.13 |