nodejs:20/nodejs-nodemon

Direct Vulnerabilities

Known vulnerabilities in the nodejs:20/nodejs-nodemon package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Inefficient Regular Expression Complexity

<0:3.0.1-1.module_el8.10.0+3982+85c136aa
  • H
Reachable Assertion

<0:3.0.1-1.module_el8.10.0+3982+85c136aa
  • H
Inefficient Regular Expression Complexity

<0:3.0.1-1.module_el8.10.0+3982+85c136aa
  • H
CVE-2026-21710

<0:3.0.1-1.module_el8.10.0+3982+85c136aa
  • H
CVE-2026-21637

<0:3.0.1-1.module_el8.10.0+3982+85c136aa
  • H
CVE-2025-59466

<0:3.0.1-1.module_el8.10.0+3982+85c136aa
  • H
CVE-2025-59465

<0:3.0.1-1.module_el8.10.0+3982+85c136aa
  • H
CVE-2025-55132

<0:3.0.1-1.module_el8.10.0+3982+85c136aa
  • H
CVE-2025-55131

<0:3.0.1-1.module_el8.10.0+3982+85c136aa
  • H
CVE-2025-55130

<0:3.0.1-1.module_el8.10.0+3982+85c136aa
  • H
CVE-2025-23166

<0:3.0.1-1.module_el8.10.0+3982+85c136aa
  • M
Use After Free

<0:3.0.1-1.module_el8.10.0+3982+85c136aa
  • H
CVE-2025-23085

<0:3.0.1-1.module_el8.8.0+3613+1ed8c91d
  • H
CVE-2025-23083

<0:3.0.1-1.module_el8.8.0+3613+1ed8c91d
  • H
Use of Insufficiently Random Values

<0:3.0.1-1.module_el8.8.0+3613+1ed8c91d
  • M
CVE-2024-36137

<0:3.0.1-1.module_el8.9.0+3731+490e3ce5
  • M
CVE-2024-28863

<0:3.0.1-1.module_el8.9.0+3731+490e3ce5
  • M
CVE-2024-22020

<0:3.0.1-1.module_el8.9.0+3731+490e3ce5
  • M
CVE-2024-22018

<0:3.0.1-1.module_el8.9.0+3731+490e3ce5
  • H
CVE-2024-28182

<0:3.0.1-1.module_el8.9.0+3731+490e3ce5
  • H
CVE-2024-27983

<0:3.0.1-1.module_el8.9.0+3731+490e3ce5
  • H
CVE-2024-27982

<0:3.0.1-1.module_el8.9.0+3731+490e3ce5
  • H
Out-of-bounds Read

<0:3.0.1-1.module_el8.9.0+3731+490e3ce5
  • H
CVE-2024-22025

<0:3.0.1-1.module_el8.9.0+3731+490e3ce5
  • H
CVE-2024-22019

<0:3.0.1-1.module_el8.9.0+3731+490e3ce5
  • H
CVE-2024-22017

<0:3.0.1-1.module_el8.9.0+3731+490e3ce5
  • H
CVE-2024-21896

<0:3.0.1-1.module_el8.9.0+3731+490e3ce5
  • H
Arbitrary Code Injection

<0:3.0.1-1.module_el8.9.0+3731+490e3ce5
  • H
Directory Traversal

<0:3.0.1-1.module_el8.9.0+3731+490e3ce5
  • H
CVE-2024-21890

<0:3.0.1-1.module_el8.9.0+3731+490e3ce5
  • H
CVE-2023-46809

<0:3.0.1-1.module_el8.9.0+3731+490e3ce5
  • H
Information Exposure

<0:3.0.1-1.module_el8.9.0+3675+0258a6d9
  • H
CVE-2023-44487

<0:3.0.1-1.module_el8.9.0+3675+0258a6d9
  • H
CVE-2023-39333

<0:3.0.1-1.module_el8.9.0+3675+0258a6d9
  • H
Directory Traversal

<0:3.0.1-1.module_el8.9.0+3675+0258a6d9
  • H
Directory Traversal

<0:3.0.1-1.module_el8.9.0+3675+0258a6d9
  • H
Insufficient Verification of Data Authenticity

<0:3.0.1-1.module_el8.9.0+3675+0258a6d9