VYPR

rpm package

almalinux/nodejs-packaging

pkg:rpm/almalinux/nodejs-packaging

Vulnerabilities (145)

  • CVE-2022-32214Jul 14, 2022
    affected < 23-3.module_el8.5.0+2618+8d46dafdfixed 23-3.module_el8.5.0+2618+8d46dafd

    The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).

  • CVE-2022-32213Jul 14, 2022
    affected < 23-3.module_el8.5.0+2618+8d46dafdfixed 23-3.module_el8.5.0+2618+8d46dafd

    The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly parse and validate Transfer-Encoding headers and can lead to HTTP Request Smuggling (HRS).

  • CVE-2022-32212Jul 14, 2022
    affected < 23-3.module_el8.5.0+2618+8d46dafdfixed 23-3.module_el8.5.0+2618+8d46dafd

    A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.20.0, <18.5.0 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding

  • CVE-2022-33987Jun 18, 2022
    affected < 23-3.module_el8.5.0+2618+8d46dafdfixed 23-3.module_el8.5.0+2618+8d46dafd

    The got package before 12.1.0 (also fixed in 11.8.5) for Node.js allows a redirect to a UNIX socket.

  • CVE-2021-44906Mar 17, 2022
    affected < 25-1.module_el8.5.0+2605+45d748affixed 25-1.module_el8.5.0+2605+45d748af

    Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).

  • CVE-2021-44533Feb 24, 2022
    affected < 23-3.module_el8.4.0+2522+3bd42762fixed 23-3.module_el8.4.0+2522+3bd42762

    Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 did not handle multi-value Relative Distinguished Names correctly. Attackers could craft certificate subjects containing a single-value Relative Distinguished Name that would be interpreted as a multi-value Relative Distinguis

  • CVE-2021-44532Feb 24, 2022
    affected < 23-3.module_el8.4.0+2522+3bd42762fixed 23-3.module_el8.4.0+2522+3bd42762

    Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name

  • CVE-2021-44531Feb 24, 2022
    affected < 23-3.module_el8.4.0+2522+3bd42762fixed 23-3.module_el8.4.0+2522+3bd42762

    Accepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 was accepting URI SAN types, which PKIs are o

  • CVE-2022-21824Feb 24, 2022
    affected < 23-3.module_el8.4.0+2522+3bd42762fixed 23-3.module_el8.4.0+2522+3bd42762

    Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The p

  • CVE-2022-0235Jan 16, 2022
    affected < 23-3.module_el8.4.0+2522+3bd42762fixed 23-3.module_el8.4.0+2522+3bd42762

    node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor

  • CVE-2021-3672Nov 23, 2021
    affected < 17-3.module_el8.4.0+2224+b07ac28efixed 17-3.module_el8.4.0+2224+b07ac28e

    A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality

  • CVE-2021-22959Nov 15, 2021
    affected < 25-1.module_el8.5.0+246+05401605fixed 25-1.module_el8.5.0+246+05401605

    The parser in accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS) in llhttp < v2.1.4 and < v6.0.6.

  • CVE-2021-43616Nov 13, 2021
    affected < 25-1.module_el8.5.0+246+05401605fixed 25-1.module_el8.5.0+246+05401605

    The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was sup

  • CVE-2021-3918Nov 13, 2021
    affected < 25-1.module_el8.5.0+246+05401605fixed 25-1.module_el8.5.0+246+05401605

    json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

  • CVE-2021-22960Nov 3, 2021
    affected < 25-1.module_el8.5.0+246+05401605fixed 25-1.module_el8.5.0+246+05401605

    The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.

  • CVE-2021-22930Oct 7, 2021
    affected < 17-3.module_el8.4.0+2224+b07ac28efixed 17-3.module_el8.4.0+2224+b07ac28e

    Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.

  • CVE-2021-3807Sep 17, 2021
    affected < 25-1.module_el8.5.0+246+05401605fixed 25-1.module_el8.5.0+246+05401605

    ansi-regex is vulnerable to Inefficient Regular Expression Complexity

  • CVE-2021-37712Aug 31, 2021
    affected < 23-3.module_el8.5.0+2618+8d46dafdfixed 23-3.module_el8.5.0+2618+8d46dafd

    The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This

  • CVE-2021-37701Aug 31, 2021
    affected < 23-3.module_el8.5.0+2618+8d46dafdfixed 23-3.module_el8.5.0+2618+8d46dafd

    The npm package "tar" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This i

  • CVE-2021-22940Aug 16, 2021
    affected < 17-3.module_el8.4.0+2224+b07ac28efixed 17-3.module_el8.4.0+2224+b07ac28e

    Node.js before 16.6.1, 14.17.5, and 12.22.5 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.

Page 5 of 8