|
30 | 30 |
|
31 | 31 | | Severity | v4 | v3 | v2 | v1 | |
32 | 32 | | -------- | --: | --: | --: | --: | |
33 | | -| critical | 3 | 3 | 3 | 1 | |
34 | | -| high | 18 | 18 | 28 | 21 | |
35 | | -| moderate | 2 | 2 | 14 | 1 | |
| 33 | +| critical | 4 | 4 | 4 | 2 | |
| 34 | +| high | 25 | 24 | 35 | 23 | |
| 35 | +| moderate | 7 | 7 | 19 | 1 | |
36 | 36 | | low | 3 | 3 | 8 | 0 | |
37 | 37 | | info | 0 | 0 | 0 | 0 | |
38 | 38 | | unknown | 0 | 0 | 0 | 0 | |
|
44 | 44 | | basic-ftp | critical | CVE-2026-27699 | v4, v3, v2 | Basic FTP has Path Traversal Vulnerability in its downloadToDir() method | |
45 | 45 | | fast-xml-parser | critical | CVE-2026-25896 | v4, v3, v2 | fast-xml-parser has an entity encoding bypass via regex injection in DOCTYPE ent | |
46 | 46 | | locutus | critical | CVE-2026-25521 | v4, v3, v2, v1 | locutus is vulnerable to Prototype Pollution | |
| 47 | +| locutus | critical | CVE-2026-32304 | v4, v3, v2, v1 | Locutus vulnerable to RCE via unsanitized input in create_function() | |
47 | 48 | | @angular/common | high | CVE-2025-66035 | v1 | Angular is Vulnerable to XSRF Token Leakage via Protocol-Relative URLs in Angula | |
48 | 49 | | @angular/compiler | high | CVE-2025-66412 | v1 | Angular Stored XSS Vulnerability via SVG Animation, SVG URL and MathML Attribute | |
49 | 50 | | @angular/compiler | high | CVE-2026-22610 | v1 | Angular has XSS Vulnerability via Unsanitized SVG Script Attributes | |
| 51 | +| @angular/compiler | high | CVE-2026-32635 | v1 | Angular vulnerable to XSS in i18n attribute bindings | |
50 | 52 | | @angular/core | high | CVE-2026-22610 | v1 | Angular has XSS Vulnerability via Unsanitized SVG Script Attributes | |
51 | 53 | | @angular/core | high | CVE-2026-27970 | v1 | Angular i18n vulnerable to Cross-Site Scripting | |
| 54 | +| @angular/core | high | CVE-2026-32635 | v1 | Angular vulnerable to XSS in i18n attribute bindings | |
52 | 55 | | @hono/node-server | high | CVE-2026-29087 | v2 | @hono/node-server has authorization bypass for protected static paths via encode | |
53 | 56 | | axios | high | CVE-2026-25639 | v3, v2 | Axios is Vulnerable to Denial of Service via **proto** Key in mergeConfig | |
54 | 57 | | braces | high | CVE-2024-4068 | v4, v3, v2, v1 | Uncontrolled resource consumption in braces | |
55 | 58 | | express-rate-limit | high | CVE-2026-30827 | v2 | express-rate-limit: IPv4-mapped IPv6 addresses bypass per-client rate limiting o | |
56 | 59 | | fast-xml-parser | high | CVE-2026-25128 | v4, v3, v2 | fast-xml-parser has RangeError DoS Numeric Entities Bug | |
57 | 60 | | fast-xml-parser | high | CVE-2026-26278 | v4, v3, v2 | fast-xml-parser affected by DoS through entity expansion in DOCTYPE (no expansio | |
| 61 | +| flatted | high | CVE-2026-32141 | v4, v3, v2 | flatted vulnerable to unbounded recursion DoS in parse() revive phase | |
58 | 62 | | hono | high | CVE-2026-29045 | v2 | Hono vulnerable to arbitrary file access via serveStatic vulnerability | |
59 | 63 | | immutable | high | CVE-2026-29063 | v2 | Immutable is vulnerable to Prototype Pollution | |
60 | 64 | | locutus | high | CVE-2026-29091 | v4, v3, v2, v1 | locutus call_user_func_array vulnerable to Remote Code Execution (RCE) due to Co | |
|
66 | 70 | | semver | high | CVE-2022-25883 | v2 | semver vulnerable to Regular Expression Denial of Service | |
67 | 71 | | serialize-javascript | high | GHSA-5c6j-r48x-rmvq | v4, v3, v2, v1 | Serialize JavaScript is Vulnerable to RCE via RegExp.flags and Date.prototype.to | |
68 | 72 | | svgo | high | CVE-2026-29074 | v4, v3, v2, v1 | SVGO DoS through entity expansion in DOCTYPE (Billion Laughs) | |
69 | | -| tar | high | CVE-2026-23950 | v1 | Race Condition in node-tar Path Reservations via Unicode Ligature Collisions on | |
70 | 73 | | tar | high | CVE-2026-24842 | v1 | node-tar Vulnerable to Arbitrary File Creation/Overwrite via Hardlink Path Trave | |
71 | 74 | | tar | high | CVE-2026-23745 | v1 | node-tar is Vulnerable to Arbitrary File Overwrite and Symlink Poisoning via Ins | |
72 | | -| tar | high | CVE-2026-26960 | v4, v3, v1 | Arbitrary File Read/Write via Hardlink Target Escape Through Symlink Chain in no | |
| 75 | +| tar | high | CVE-2026-26960 | v4, v1 | Arbitrary File Read/Write via Hardlink Target Escape Through Symlink Chain in no | |
73 | 76 | | tar | high | CVE-2026-29786 | v4, v3, v2, v1 | tar has Hardlink Path Traversal via Drive-Relative Linkpath | |
74 | 77 | | tar | high | CVE-2026-31802 | v4, v3, v2, v1 | node-tar Symlink Path Traversal via Drive-Relative Linkpath | |
| 78 | +| tar | high | CVE-2026-23950 | v1 | Race Condition in node-tar Path Reservations via Unicode Ligature Collisions on | |
| 79 | +| undici | high | CVE-2026-1528 | v4, v3, v2 | Undici: Malicious WebSocket 64-bit length overflows parser and crashes the clien | |
| 80 | +| undici | high | CVE-2026-1526 | v4, v3, v2 | Undici has Unbounded Memory Consumption in WebSocket permessage-deflate Decompre | |
| 81 | +| undici | high | CVE-2026-2229 | v4, v3, v2 | Undici has Unhandled Exception in WebSocket Client Due to Invalid server_max_win | |
75 | 82 | | ajv | moderate | CVE-2025-69873 | v3, v2 | ajv has ReDoS when using `$data` option | |
76 | 83 | | ejs | moderate | CVE-2024-33883 | v2 | ejs lacks certain pollution protection | |
77 | 84 | | esbuild | moderate | GHSA-67mh-4wv8-2f99 | v2 | esbuild enables any website to send any requests to the development server and r | |
|
84 | 91 | | nanoid | moderate | CVE-2024-55565 | v2 | Predictable results in nanoid generation when given non-integer values | |
85 | 92 | | qs | moderate | CVE-2025-15284 | v2 | qs's arrayLimit bypass in its bracket notation allows DoS via memory exhaustion | |
86 | 93 | | serialize-javascript | moderate | CVE-2024-11831 | v2 | Cross-site Scripting (XSS) in serialize-javascript | |
| 94 | +| undici | moderate | CVE-2026-1525 | v4, v3, v2 | Undici has an HTTP Request/Response Smuggling issue | |
| 95 | +| undici | moderate | CVE-2026-1527 | v4, v3, v2 | Undici has CRLF Injection in undici via `upgrade` option | |
| 96 | +| undici | moderate | CVE-2026-2581 | v4, v3, v2 | Undici has Unbounded Memory Consumption in its DeduplicationHandler via Response | |
87 | 97 | | webpack | moderate | CVE-2024-43788 | v2 | Webpack's AutoPublicPathRuntimeModule has a DOM Clobbering Gadget that leads to | |
88 | 98 | | webpack-dev-server | moderate | CVE-2025-30360 | v2 | webpack-dev-server users' source code may be stolen when they access a malicious | |
89 | 99 | | webpack-dev-server | moderate | CVE-2025-30359 | v2 | webpack-dev-server users' source code may be stolen when they access a malicious | |
|
0 commit comments