nodejs:20/nodejs-nodemon vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the nodejs:20/nodejs-nodemon package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Excessive Platform Resource Consumption within a Loop

*
  • H
Detection of Error Condition Without Action

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Resource Exhaustion

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
HTTP Request Smuggling

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Buffer Under-read

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Resource Exhaustion

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Resource Exhaustion

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Improper Privilege Management

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Directory Traversal

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Arbitrary Code Injection

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Directory Traversal

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Incomplete Documentation

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Covert Timing Channel

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • M
Incorrect Permission Assignment for Critical Resource

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • M
CVE-2024-22020

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • M
CVE-2024-22018

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • M
Incorrect Permission Assignment for Critical Resource

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • M
CVE-2024-22020

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • M
CVE-2024-22018

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Detection of Error Condition Without Action

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Resource Exhaustion

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
HTTP Request Smuggling

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Buffer Under-read

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Resource Exhaustion

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Resource Exhaustion

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Improper Privilege Management

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Directory Traversal

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Arbitrary Code Injection

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Directory Traversal

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Incomplete Documentation

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Covert Timing Channel

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781
  • H
Directory Traversal

<0:3.0.1-1.module+el9.3.0.z+20478+84a9f781