|
31 | 31 | | Severity | v4 | v3 | v2 | v1 | |
32 | 32 | | -------- | --: | --: | --: | --: | |
33 | 33 | | critical | 4 | 4 | 4 | 2 | |
34 | | -| high | 25 | 24 | 35 | 23 | |
35 | | -| moderate | 7 | 7 | 19 | 1 | |
| 34 | +| high | 28 | 25 | 36 | 23 | |
| 35 | +| moderate | 8 | 8 | 20 | 1 | |
36 | 36 | | low | 3 | 3 | 8 | 0 | |
37 | 37 | | info | 0 | 0 | 0 | 0 | |
38 | 38 | | unknown | 0 | 0 | 0 | 0 | |
|
58 | 58 | | express-rate-limit | high | CVE-2026-30827 | v2 | express-rate-limit: IPv4-mapped IPv6 addresses bypass per-client rate limiting o | |
59 | 59 | | fast-xml-parser | high | CVE-2026-25128 | v4, v3, v2 | fast-xml-parser has RangeError DoS Numeric Entities Bug | |
60 | 60 | | fast-xml-parser | high | CVE-2026-26278 | v4, v3, v2 | fast-xml-parser affected by DoS through entity expansion in DOCTYPE (no expansio | |
| 61 | +| fast-xml-parser | high | CVE-2026-33036 | v4, v3, v2 | fast-xml-parser affected by numeric entity expansion bypassing all entity expans | |
61 | 62 | | flatted | high | CVE-2026-32141 | v4, v3, v2 | flatted vulnerable to unbounded recursion DoS in parse() revive phase | |
| 63 | +| flatted | high | CVE-2026-33228 | v4, v3, v2 | Prototype Pollution via parse() in NodeJS flatted | |
62 | 64 | | hono | high | CVE-2026-29045 | v2 | Hono vulnerable to arbitrary file access via serveStatic vulnerability | |
63 | 65 | | immutable | high | CVE-2026-29063 | v2 | Immutable is vulnerable to Prototype Pollution | |
64 | 66 | | locutus | high | CVE-2026-29091 | v4, v3, v2, v1 | locutus call_user_func_array vulnerable to Remote Code Execution (RCE) due to Co | |
|
69 | 71 | | rollup | high | CVE-2026-27606 | v1 | Rollup 4 has Arbitrary File Write via Path Traversal | |
70 | 72 | | semver | high | CVE-2022-25883 | v2 | semver vulnerable to Regular Expression Denial of Service | |
71 | 73 | | serialize-javascript | high | GHSA-5c6j-r48x-rmvq | v4, v3, v2, v1 | Serialize JavaScript is Vulnerable to RCE via RegExp.flags and Date.prototype.to | |
| 74 | +| socket.io-parser | high | CVE-2026-33151 | v4, v3, v2 | socket.io allows an unbounded number of binary attachments | |
72 | 75 | | svgo | high | CVE-2026-29074 | v4, v3, v2, v1 | SVGO DoS through entity expansion in DOCTYPE (Billion Laughs) | |
73 | 76 | | tar | high | CVE-2026-24842 | v1 | node-tar Vulnerable to Arbitrary File Creation/Overwrite via Hardlink Path Trave | |
74 | 77 | | tar | high | CVE-2026-23745 | v1 | node-tar is Vulnerable to Arbitrary File Overwrite and Symlink Poisoning via Ins | |
75 | 78 | | tar | high | CVE-2026-26960 | v4, v1 | Arbitrary File Read/Write via Hardlink Target Escape Through Symlink Chain in no | |
76 | | -| tar | high | CVE-2026-29786 | v4, v3, v2, v1 | tar has Hardlink Path Traversal via Drive-Relative Linkpath | |
77 | | -| tar | high | CVE-2026-31802 | v4, v3, v2, v1 | node-tar Symlink Path Traversal via Drive-Relative Linkpath | |
| 79 | +| tar | high | CVE-2026-29786 | v4, v1 | tar has Hardlink Path Traversal via Drive-Relative Linkpath | |
| 80 | +| tar | high | CVE-2026-31802 | v4, v1 | node-tar Symlink Path Traversal via Drive-Relative Linkpath | |
78 | 81 | | tar | high | CVE-2026-23950 | v1 | Race Condition in node-tar Path Reservations via Unicode Ligature Collisions on | |
79 | 82 | | undici | high | CVE-2026-1528 | v4, v3, v2 | Undici: Malicious WebSocket 64-bit length overflows parser and crashes the clien | |
80 | 83 | | undici | high | CVE-2026-1526 | v4, v3, v2 | Undici has Unbounded Memory Consumption in WebSocket permessage-deflate Decompre | |
81 | 84 | | undici | high | CVE-2026-2229 | v4, v3, v2 | Undici has Unhandled Exception in WebSocket Client Due to Invalid server_max_win | |
82 | 85 | | ajv | moderate | CVE-2025-69873 | v3, v2 | ajv has ReDoS when using `$data` option | |
83 | 86 | | ejs | moderate | CVE-2024-33883 | v2 | ejs lacks certain pollution protection | |
84 | 87 | | esbuild | moderate | GHSA-67mh-4wv8-2f99 | v2 | esbuild enables any website to send any requests to the development server and r | |
| 88 | +| fast-xml-parser | moderate | CVE-2026-33349 | v4, v3, v2 | Entity Expansion Limits Bypassed When Set to Zero Due to JavaScript Falsy Evalua | |
85 | 89 | | file-type | moderate | CVE-2026-31808 | v4 | file-type affected by infinite loop in ASF parser on malformed input with zero-s | |
86 | 90 | | hono | moderate | CVE-2026-29086 | v2 | Hono Vulnerable to Cookie Attribute Injection via Unsanitized domain and path in | |
87 | 91 | | hono | moderate | CVE-2026-29085 | v2 | Hono Vulnerable to SSE Control Field Injection via CR/LF in writeSSE() | |
|
0 commit comments