[Snyk] Security upgrade node from 14.1.0 to 14.19.1#56
[Snyk] Security upgrade node from 14.1.0 to 14.19.1#56
Conversation
The following vulnerabilities are fixed with an upgrade: - https://snyk.io/vuln/SNYK-DEBIAN9-OPENSSL-2807589 - https://snyk.io/vuln/SNYK-DEBIAN9-PYTHON35-1063181 - https://snyk.io/vuln/SNYK-DEBIAN9-PYTHON35-340072 - https://snyk.io/vuln/SNYK-DEBIAN9-PYTHON35-453739 - https://snyk.io/vuln/SNYK-DEBIAN9-PYTHON35-584435
Micro-Learning Topic: OS command injection (Detected by phrase)Matched on "OS Command Injection"In many situations, applications will rely on OS provided functions, scripts, macros and utilities instead of reimplementing them in code. While functions would typically be accessed through a native interface library, the remaining three OS provided features will normally be invoked via the command line or launched as a process. If unsafe inputs are used to construct commands or arguments, it may allow arbitrary OS operations to be performed that can compromise the server. Try this challenge in Secure Code WarriorMicro-Learning Topic: Directory traversal (Detected by phrase)Matched on "Directory Traversal"Path traversal vulnerabilities occur when inputs that have not been sufficiently validated or sanitised are used to build directory or file paths. If an attacker can influence the path being accessed by the server, they may be able to gain unauthorised access to files or even execute arbitrary code on the server (when coupled with file upload functionality). Try this challenge in Secure Code WarriorMicro-Learning Topic: Buffer overflow (Detected by phrase)Matched on "Buffer Overflow"A buffer overflow condition exists when a program attempts to put more data in a buffer than it can hold or when a program attempts to put data in a memory area past a buffer. Try this challenge in Secure Code Warrior |
This PR was automatically created by Snyk using the credentials of a real user.
Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.
Changes included in this PR
We recommend upgrading to
node:14.19.1, as this image has only 580 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.Some of the most important vulnerabilities in your base image include:
SNYK-DEBIAN9-OPENSSL-2807589
SNYK-DEBIAN9-PYTHON35-1063181
SNYK-DEBIAN9-PYTHON35-340072
SNYK-DEBIAN9-PYTHON35-453739
SNYK-DEBIAN9-PYTHON35-584435
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
🛠 Adjust project settings
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Directory Traversal