nodejs-packaging-bundler vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the nodejs-packaging-bundler package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
CVE-2024-27983

<0:2021.06-4.module+el8.9.0+90082+b6a613a6
  • H
CVE-2024-25629

<0:2021.06-4.module+el8.9.0+90157+ed89dc20
  • H
CVE-2024-22025

<0:2021.06-4.module+el8.9.0+90082+b6a613a6
  • H
CVE-2024-27982

<0:2021.06-4.module+el8.9.0+90157+ed89dc20
  • H
CVE-2024-28182

<0:2021.06-4.module+el8.9.0+90157+ed89dc20
  • H
CVE-2024-21891

<0:2021.06-4.module+el8.9.0+90082+b6a613a6
  • H
CVE-2024-21896

<0:2021.06-4.module+el8.9.0+90082+b6a613a6
  • H
CVE-2024-22017

<0:2021.06-4.module+el8.9.0+90082+b6a613a6
  • H
CVE-2024-21890

<0:2021.06-4.module+el8.9.0+90082+b6a613a6
  • H
CVE-2024-22019

<0:2021.06-4.module+el8.9.0+90082+b6a613a6
  • H
CVE-2023-46809

<0:2021.06-4.module+el8.9.0+90082+b6a613a6
  • H
CVE-2024-21892

<0:2021.06-4.module+el8.9.0+90082+b6a613a6
  • H
Directory Traversal

<0:2021.06-4.module+el8.9.0+90082+b6a613a6
  • H
Directory Traversal

<0:2021.06-4.module+el8.9.0+90082+b6a613a6
  • H
Insufficient Verification of Data Authenticity

<0:2021.06-4.module+el8.9.0+90082+b6a613a6
  • H
Information Exposure

<0:2021.06-4.module+el8.9.0+90082+b6a613a6
  • H
CVE-2023-39333

<0:2021.06-4.module+el8.9.0+90082+b6a613a6
  • H
Resource Exhaustion

<0:2021.06-4.module+el8.9.0+90082+b6a613a6
  • H
CVE-2023-32559

<0:2021.06-4.module+el8.7.0+20766+0a247725
  • H
Inefficient Regular Expression Complexity

<0:2021.06-4.module+el8.7.0+20766+0a247725
  • H
CVE-2023-32006

<0:2021.06-4.module+el8.7.0+20766+0a247725
  • H
CVE-2023-32002

<0:2021.06-4.module+el8.7.0+20766+0a247725
  • M
CVE-2023-30589

<0:2021.06-4.module+el8.7.0+20766+0a247725
  • M
CVE-2023-30588

<0:2021.06-4.module+el8.7.0+20766+0a247725
  • M
CVE-2023-30581

<0:2021.06-4.module+el8.7.0+20766+0a247725
  • M
CVE-2023-30590

<0:2021.06-4.module+el8.7.0+20766+0a247725
  • H
Use of Insufficiently Random Values

<0:2021.06-4.module+el8.7.0+20766+0a247725
  • H
Out-of-bounds Write

<0:2021.06-4.module+el8.7.0+20766+0a247725
  • H
Use of Insufficiently Random Values

<0:2021.06-4.module+el8.7.0+20766+0a247725
  • H
CVE-2023-32067

<0:2021.06-4.module+el8.7.0+20766+0a247725
  • M
Incorrect Authorization

<0:2021.06-4.module+el8.7.0+20766+0a247725
  • M
Inefficient Regular Expression Complexity

<0:2021.06-4.module+el8.7.0+20766+0a247725
  • M
Inefficient Regular Expression Complexity

<0:2021.06-4.module+el8.7.0+20766+0a247725
  • M
Inefficient Regular Expression Complexity

<0:2021.06-4.module+el8.7.0+20766+0a247725
  • M
Arbitrary Code Injection

<0:2021.06-4.module+el8.7.0+20766+0a247725
  • H
Improper Validation of Specified Quantity in Input

<0:2021.06-4.module+el8.7.0+20766+0a247725
  • M
Untrusted Search Path

<0:2021.06-4.module+el8.7.0+20766+0a247725
  • M
Inefficient Regular Expression Complexity

<0:2021.06-4.module+el8.7.0+20766+0a247725
  • M
OS Command Injection

<0:2021.06-4.module+el8.7.0+20766+0a247725
  • H
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

<0:2021.06-4.module+el8.7.0+20766+0a247725
  • H
HTTP Request Smuggling

<0:2021.06-4.module+el8.7.0+20766+0a247725