nodejs-nodemon vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the nodejs-nodemon package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
CVE-2024-22025

<0:3.0.1-1.module+el8.9.0+90157+ed89dc20
  • H
CVE-2024-27982

<0:3.0.1-1.module+el8.9.0+90157+ed89dc20
  • H
CVE-2024-27983

<0:3.0.1-1.module+el8.9.0+90157+ed89dc20
  • H
CVE-2024-25629

<0:3.0.1-1.module+el8.9.0+90082+b6a613a6
  • H
CVE-2024-28182

<0:3.0.1-1.module+el8.9.0+90082+b6a613a6
  • H
CVE-2024-21890

<0:3.0.1-1.module+el8.9.0+90082+b6a613a6
  • H
CVE-2024-22017

<0:3.0.1-1.module+el8.9.0+90082+b6a613a6
  • H
CVE-2024-21891

<0:3.0.1-1.module+el8.9.0+90082+b6a613a6
  • H
CVE-2024-21896

<0:3.0.1-1.module+el8.9.0+90082+b6a613a6
  • H
CVE-2024-21892

<0:3.0.1-1.module+el8.9.0+90082+b6a613a6
  • H
CVE-2023-46809

<0:3.0.1-1.module+el8.9.0+90082+b6a613a6
  • H
CVE-2024-22019

<0:3.0.1-1.module+el8.9.0+90082+b6a613a6
  • H
Directory Traversal

<0:3.0.1-1.module+el8.9.0+90082+b6a613a6
  • H
Directory Traversal

<0:3.0.1-1.module+el8.9.0+90082+b6a613a6
  • H
Insufficient Verification of Data Authenticity

<0:3.0.1-1.module+el8.9.0+90082+b6a613a6
  • H
Information Exposure

<0:3.0.1-1.module+el8.9.0+90082+b6a613a6
  • H
CVE-2023-39333

<0:3.0.1-1.module+el8.9.0+90082+b6a613a6
  • H
Resource Exhaustion

<0:3.0.1-1.module+el8.9.0+90185+b2d3b544
  • H
CVE-2023-32559

<0:3.0.1-1.module+el8.8.0+21172+0baa0bae
  • H
Inefficient Regular Expression Complexity

<0:3.0.1-1.module+el8.8.0+21172+0baa0bae
  • H
CVE-2023-32006

<0:3.0.1-1.module+el8.8.0+21170+2efec6d4
  • H
CVE-2023-32002

<0:3.0.1-1.module+el8.8.0+21170+2efec6d4
  • M
CVE-2023-30589

<0:2.0.20-2.module+el8.8.0+21140+54ee8b93
  • M
CVE-2023-30588

<0:2.0.20-2.module+el8.8.0+21140+54ee8b93
  • M
CVE-2023-30581

<0:2.0.20-2.module+el8.8.0+21140+54ee8b93
  • M
CVE-2023-30590

<0:2.0.20-2.module+el8.8.0+21140+54ee8b93
  • H
Use of Insufficiently Random Values

<0:2.0.20-2.module+el8.8.0+21122+857852f8
  • H
Out-of-bounds Write

<0:2.0.20-3.module+el8.8.0+21121+9536f36f
  • H
Use of Insufficiently Random Values

<0:2.0.20-3.module+el8.8.0+21121+9536f36f
  • H
CVE-2023-32067

<0:2.0.20-2.module+el8.8.0+21122+857852f8
  • H
Improper Input Validation

<0:2.0.20-3.module+el8.7.0+21031+52889874
  • M
CVE-2023-23919

<0:2.0.20-3.module+el8.7.0+21021+1eb7f63d
  • H
Incorrect Authorization

<0:2.0.20-3.module+el8.7.0+21031+52889874
  • M
Inefficient Regular Expression Complexity

<0:2.0.20-3.module+el8.7.0+21021+1eb7f63d
  • H
Inefficient Regular Expression Complexity

<0:2.0.20-3.module+el8.7.0+21031+52889874
  • H
Inefficient Regular Expression Complexity

<0:2.0.20-3.module+el8.7.0+21031+52889874
  • M
Arbitrary Code Injection

<0:2.0.20-3.module+el8.7.0+21021+1eb7f63d
  • H
Improper Validation of Specified Quantity in Input

<0:2.0.20-2.module+el8.8.0+21122+857852f8
  • H
Untrusted Search Path

<0:2.0.20-3.module+el8.7.0+21031+52889874
  • M
Information Exposure

<0:2.0.20-2.module+el8.7.0+20895+79a25710
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:2.0.20-2.module+el8.7.0+20895+79a25710
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:2.0.20-2.module+el8.7.0+20895+79a25710
  • H
Inefficient Regular Expression Complexity

<0:2.0.20-3.module+el8.7.0+21031+52889874
  • M
OS Command Injection

<0:2.0.20-2.module+el8.7.0+20895+79a25710
  • M
Improper Certificate Validation

<0:2.0.20-2.module+el8.7.0+20893+df13f383
  • M
Improper Certificate Validation

<0:2.0.20-2.module+el8.7.0+20893+df13f383
  • M
Improper Certificate Validation

<0:2.0.20-2.module+el8.7.0+20893+df13f383
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:2.0.20-2.module+el8.7.0+20893+df13f383
  • H
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

<0:2.0.19-1.module+el8.7.0+20766+0a247725
  • H
HTTP Request Smuggling

<0:2.0.19-1.module+el8.7.0+20766+0a247725
  • M
HTTP Request Smuggling

<0:2.0.19-2.module+el8.6.0+20729+8fb6d84e
  • M
HTTP Request Smuggling

<0:2.0.19-2.module+el8.6.0+20742+4c4c4b80
  • M
HTTP Request Smuggling

<0:2.0.19-2.module+el8.6.0+20742+4c4c4b80
  • M
OS Command Injection

<0:2.0.19-2.module+el8.6.0+20742+4c4c4b80
  • M
CVE-2022-33987

<0:2.0.19-2.module+el8.6.0+20742+4c4c4b80
  • H
Insufficient Verification of Data Authenticity

<0:2.0.15-1.module+el8.6.0+20672+19f3909b
  • M
Directory Traversal

<0:2.0.15-1.module+el8.5.0+20489+261d51d3
  • M
Directory Traversal

<0:2.0.15-1.module+el8.5.0+20489+261d51d3
  • M
Resource Exhaustion

<0:2.0.15-1.module+el8.5.0+20489+261d51d3
  • M
Inefficient Regular Expression Complexity

<0:2.0.15-1.module+el8.5.0+20489+261d51d3
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:2.0.15-1.module+el8.5.0+20489+261d51d3
  • M
HTTP Request Smuggling

<0:2.0.15-1.module+el8.5.0+20489+261d51d3
  • M
Inefficient Regular Expression Complexity

<0:2.0.19-2.module+el8.6.0+20742+4c4c4b80
  • M
HTTP Request Smuggling

<0:2.0.15-1.module+el8.5.0+20489+261d51d3
  • H
CVE-2021-23343

<0:2.0.3-1.module+el8.3.0+7818+6cd30d85
  • H
Directory Traversal

<0:2.0.3-1.module+el8.3.0+7818+6cd30d85
  • H
Improper Input Validation

<0:2.0.3-1.module+el8.4.0+20281+eb64e322
  • H
Cross-site Scripting (XSS)

<0:2.0.3-1.module+el8.3.0+7818+6cd30d85
  • H
Use After Free

<0:2.0.3-1.module+el8.3.0+7818+6cd30d85
  • H
Link Following

<0:2.0.3-1.module+el8.3.0+7818+6cd30d85
  • H
Use After Free

<0:2.0.3-1.module+el8.3.0+7818+6cd30d85
  • H
Improper Certificate Validation

<0:2.0.3-1.module+el8.4.0+20281+eb64e322
  • M
Inefficient Regular Expression Complexity

<0:2.0.3-1.module+el8.3.0+7818+6cd30d85
  • M
Out-of-bounds Read

<0:2.0.3-1.module+el8.4.0+20281+eb64e322
  • M
CVE-2021-27290

<0:2.0.3-1.module+el8.3.0+7818+6cd30d85
  • H
CVE-2021-22884

<0:2.0.3-1.module+el8.3.0+7818+6cd30d85
  • H
Missing Release of Resource after Effective Lifetime

<0:2.0.3-1.module+el8.3.0+7818+6cd30d85
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:1.18.3-1.module+el8.1.0+5392+4d6b561f
  • M
Use After Free

<0:1.18.3-1.module+el8.1.0+5392+4d6b561f
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:2.0.15-1.module+el8.5.0+20489+261d51d3
  • M
HTTP Request Smuggling

<0:1.18.3-1.module+el8.1.0+5392+4d6b561f
  • M
Arbitrary Argument Injection

<0:2.0.3-1.module+el8.3.0+9643+8c99e187
  • M
CVE-2020-7754

<0:2.0.3-1.module+el8.3.0+7818+6cd30d85
  • M
Resource Exhaustion

<0:2.0.3-1.module+el8.3.0+9643+8c99e187
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:1.18.3-1.module+el8.1.0+5392+4d6b561f
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:1.18.3-1.module+el8.1.0+5392+4d6b561f
  • M
Resource Exhaustion

<0:2.0.3-1.module+el8.3.0+7818+6cd30d85
  • M
Information Exposure Through Log Files

<0:1.18.3-1.module+el8.1.0+5392+4d6b561f
  • M
Buffer Overflow

<0:1.18.3-1.module+el8.1.0+5392+4d6b561f
  • M
HTTP Request Smuggling

<0:1.18.3-1.module+el8.1.0+5393+aaf413e3
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:1.18.3-1.module+el8.1.0+5392+4d6b561f
  • H
Integer Underflow

<0:1.18.3-1.module+el8.1.0+5393+aaf413e3
  • H
Improper Enforcement of Message or Data Structure

<0:1.18.3-1.module+el8.1.0+5393+aaf413e3
  • H
Improper Certificate Validation

<0:1.18.3-1.module+el8.1.0+5393+aaf413e3
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:1.18.3-1.module+el8.1.0+5393+aaf413e3
  • H
Directory Traversal

<0:1.18.3-1.module+el8.1.0+5392+4d6b561f
  • H
Integer Overflow or Wraparound

<0:1.18.3-1.module+el8.1.0+5392+4d6b561f
  • H
HTTP Request Smuggling

<0:1.18.3-1.module+el8.1.0+5392+4d6b561f
  • H
Improper Privilege Management

<0:1.18.3-1.module+el8.1.0+5392+4d6b561f
  • H
CVE-2019-15606

<0:1.18.3-1.module+el8.1.0+5392+4d6b561f
  • H
Improper Certificate Validation

<0:1.18.3-1.module+el8.1.0+5393+aaf413e3
  • H
Symlink Following

<0:1.18.3-1.module+el8.1.0+5392+4d6b561f
  • H
Allocation of Resources Without Limits or Throttling

<0:1.18.3-1.module+el8.0.0+5349+4d6b561f
  • H
Allocation of Resources Without Limits or Throttling

<0:1.18.3-1.module+el8.0.0+5349+4d6b561f
  • H
Allocation of Resources Without Limits or Throttling

<0:1.18.3-1.module+el8.0.0+5349+4d6b561f
  • H
Allocation of Resources Without Limits or Throttling

<0:1.18.3-1.module+el8.0.0+5349+4d6b561f
  • H
Allocation of Resources Without Limits or Throttling

<0:1.18.3-1.module+el8.0.0+5349+4d6b561f
  • H
CVE-2019-9513

<0:1.18.3-1.module+el8.0.0+5349+4d6b561f
  • H
Allocation of Resources Without Limits or Throttling

<0:1.18.3-1.module+el8.0.0+5349+4d6b561f
  • H
Resource Exhaustion

<0:1.18.3-1.module+el8.0.0+5349+4d6b561f