Security update for rh-nodejs8-nodejs with multiple CVE fixe
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Red Hat Security Advisory: rh-nodejs8-nodejs security update | 13 Sep 202416:56 | – | osv |
![]() | CVE-2019-5737 | 28 Mar 201917:29 | – | osv |
![]() | nodejs vulnerabilities | 15 Mar 202121:18 | – | osv |
![]() | Red Hat Security Advisory: rh-nodejs10-nodejs security update | 20 Sep 202413:54 | – | osv |
![]() | CVE-2018-20834 | 30 Apr 201919:29 | – | osv |
![]() | Arbitrary File Overwrite in tar | 1 May 201918:37 | – | osv |
![]() | CVE-2018-12116 | 28 Nov 201817:29 | – | osv |
![]() | CVE-2018-12123 | 28 Nov 201817:29 | – | osv |
![]() | CVE-2018-12122 | 28 Nov 201817:29 | – | osv |
![]() | CVE-2018-12121 | 28 Nov 201817:29 | – | osv |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 7 | aarch64 | rh-nodejs8-nodejs-devel | 8.16.0-1.el7 | rh-nodejs8-nodejs-devel-8.16.0-1.el7.aarch64.rpm |
RedHat | 7 | aarch64 | rh-nodejs8-npm | 6.4.1-8.16.0.1.el7 | rh-nodejs8-npm-6.4.1-8.16.0.1.el7.aarch64.rpm |
RedHat | 7 | x86_64 | rh-nodejs8-nodejs | 8.16.0-1.el7 | rh-nodejs8-nodejs-8.16.0-1.el7.x86_64.rpm |
RedHat | 7 | ppc64le | rh-nodejs8-nodejs-devel | 8.16.0-1.el7 | rh-nodejs8-nodejs-devel-8.16.0-1.el7.ppc64le.rpm |
RedHat | 7 | noarch | rh-nodejs8-nodejs-docs | 8.16.0-1.el7 | rh-nodejs8-nodejs-docs-8.16.0-1.el7.noarch.rpm |
RedHat | 7 | s390x | rh-nodejs8-npm | 6.4.1-8.16.0.1.el7 | rh-nodejs8-npm-6.4.1-8.16.0.1.el7.s390x.rpm |
RedHat | 7 | ppc64le | rh-nodejs8-nodejs | 8.16.0-1.el7 | rh-nodejs8-nodejs-8.16.0-1.el7.ppc64le.rpm |
RedHat | 7 | s390x | rh-nodejs8-nodejs-debuginfo | 8.16.0-1.el7 | rh-nodejs8-nodejs-debuginfo-8.16.0-1.el7.s390x.rpm |
RedHat | 7 | s390x | rh-nodejs8-nodejs | 8.16.0-1.el7 | rh-nodejs8-nodejs-8.16.0-1.el7.s390x.rpm |
RedHat | 7 | x86_64 | rh-nodejs8-npm | 6.4.1-8.16.0.1.el7 | rh-nodejs8-npm-6.4.1-8.16.0.1.el7.x86_64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo