| @hapi/content |
CVE-2026-35213 |
高危 |
5.0.2 |
6.0.1 |
@hapi/content: Regular Expression Denial of Service (ReDoS) in HTTP header parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-35213
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-06 21:16 修改: 2026-04-16 04:26
|
| axios |
CVE-2026-42033 |
高危 |
1.13.5 |
1.15.1, 0.31.1 |
axios: Axios: HTTP Transport Hijacking via Prototype Pollution
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42033
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-24 18:16 修改: 2026-04-27 20:02
|
| axios |
CVE-2026-42035 |
高危 |
1.13.5 |
1.15.1, 0.31.1 |
axios: Axios: Arbitrary HTTP header injection via prototype pollution
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42035
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-24 18:16 修改: 2026-04-27 19:58
|
| axios |
CVE-2026-42043 |
高危 |
1.13.5 |
1.15.1, 0.31.1 |
axios: Axios: NO_PROXY bypass via crafted URL
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42043
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-24 18:16 修改: 2026-04-27 20:05
|
| axios |
CVE-2026-42264 |
高危 |
1.13.5 |
1.15.2 |
Axios is a promise based HTTP client for the browser and Node.js. From ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42264
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-05-08 04:16 修改: 2026-05-08 16:02
|
| basic-ftp |
CVE-2026-39983 |
高危 |
5.2.0 |
5.2.1 |
basic-ftp: basic-ftp: Command injection via CRLF sequences in file path parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39983
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-09 18:17 修改: 2026-04-14 20:07
|
| basic-ftp |
CVE-2026-41324 |
高危 |
5.2.0 |
5.3.0 |
basic-ftp: basic-ftp: Denial of Service via unbounded memory growth from malicious directory listings
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41324
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-24 04:16 修改: 2026-04-27 17:48
|
| basic-ftp |
CVE-2026-44240 |
高危 |
5.2.0 |
5.3.1 |
basic-ftp allows a malicious FTP server to cause client-side denial of service via unbounded multiline control response buffering
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44240
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-05-12 21:16 修改: 2026-05-12 21:16
|
| basic-ftp |
GHSA-6v7q-wjvx-w8wg |
高危 |
5.2.0 |
5.2.2 |
basic-ftp: Incomplete CRLF Injection Protection Allows Arbitrary FTP Command Execution via Credentials and MKD Commands
漏洞详情: https://github.com/advisories/GHSA-6v7q-wjvx-w8wg
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-10 20:18 修改: 2026-04-10 20:18
|
| fast-uri |
CVE-2026-6321 |
高危 |
3.0.6 |
3.1.1 |
fast-uri: fast-uri: Path traversal vulnerability allows bypass of security policies
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6321
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-05-04 20:16 修改: 2026-05-12 18:54
|
| fast-uri |
CVE-2026-6322 |
高危 |
3.0.6 |
3.1.2 |
fast-uri normalize() decoded percent-encoded authority delimiters insi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6322
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-05-05 11:16 修改: 2026-05-12 19:11
|
| fast-uri |
CVE-2026-6321 |
高危 |
3.1.0 |
3.1.1 |
fast-uri: fast-uri: Path traversal vulnerability allows bypass of security policies
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6321
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-05-04 20:16 修改: 2026-05-12 18:54
|
| fast-uri |
CVE-2026-6321 |
高危 |
3.1.0 |
3.1.1 |
fast-uri: fast-uri: Path traversal vulnerability allows bypass of security policies
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6321
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-05-04 20:16 修改: 2026-05-12 18:54
|
| fast-uri |
CVE-2026-6322 |
高危 |
3.1.0 |
3.1.2 |
fast-uri normalize() decoded percent-encoded authority delimiters insi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6322
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-05-05 11:16 修改: 2026-05-12 19:11
|
| fast-uri |
CVE-2026-6322 |
高危 |
3.1.0 |
3.1.2 |
fast-uri normalize() decoded percent-encoded authority delimiters insi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6322
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-05-05 11:16 修改: 2026-05-12 19:11
|
| fast-xml-builder |
CVE-2026-44665 |
高危 |
1.1.4 |
1.1.7 |
fast-xml-builder allows attribute values with unwanted quotes to bypass malicious or unwanted attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44665
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| axios |
CVE-2026-40175 |
中危 |
1.13.5 |
1.15.0, 0.31.0 |
axios: Axios: Remote Code Execution via Prototype Pollution escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40175
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-10 20:16 修改: 2026-05-12 13:17
|
| axios |
CVE-2026-42034 |
中危 |
1.13.5 |
1.15.1, 0.31.1 |
axios: Axios: Denial of Service via oversized streamed uploads bypassing body limits
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42034
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-24 18:16 修改: 2026-04-27 19:59
|
| axios |
CVE-2026-42036 |
中危 |
1.13.5 |
1.15.1, 0.31.1 |
axios: Axios: Denial of Service via unbounded stream consumption when 'responseType: 'stream'' is used
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42036
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-24 18:16 修改: 2026-04-27 19:57
|
| brace-expansion |
CVE-2026-33750 |
中危 |
1.1.12 |
5.0.5, 3.0.2, 2.0.3, 1.1.13 |
brace-expansion: brace-expansion: Denial of Service via zero step value in brace pattern
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33750
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-03-27 15:16 修改: 2026-04-22 14:23
|
| brace-expansion |
CVE-2026-33750 |
中危 |
1.1.12 |
5.0.5, 3.0.2, 2.0.3, 1.1.13 |
brace-expansion: brace-expansion: Denial of Service via zero step value in brace pattern
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33750
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-03-27 15:16 修改: 2026-04-22 14:23
|
| dompurify |
CVE-2026-41238 |
中危 |
3.3.2 |
3.4.0 |
DOMPurify: DOMPurify: Cross-Site Scripting bypass via prototype pollution
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41238
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-23 16:16 修改: 2026-04-23 18:16
|
| dompurify |
CVE-2026-41238 |
中危 |
3.3.2 |
3.4.0 |
DOMPurify: DOMPurify: Cross-Site Scripting bypass via prototype pollution
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41238
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-23 16:16 修改: 2026-04-23 18:16
|
| dompurify |
CVE-2026-41238 |
中危 |
3.3.2 |
3.4.0 |
DOMPurify: DOMPurify: Cross-Site Scripting bypass via prototype pollution
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41238
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-23 16:16 修改: 2026-04-23 18:16
|
| dompurify |
CVE-2026-41239 |
中危 |
3.3.2 |
3.4.0 |
DOMPurify: Vue 2: DOMPurify: Cross-site scripting due to incomplete sanitization of template expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41239
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-23 16:16 修改: 2026-04-23 16:18
|
| dompurify |
CVE-2026-41239 |
中危 |
3.3.2 |
3.4.0 |
DOMPurify: Vue 2: DOMPurify: Cross-site scripting due to incomplete sanitization of template expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41239
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-23 16:16 修改: 2026-04-23 16:18
|
| dompurify |
CVE-2026-41239 |
中危 |
3.3.2 |
3.4.0 |
DOMPurify: Vue 2: DOMPurify: Cross-site scripting due to incomplete sanitization of template expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41239
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-23 16:16 修改: 2026-04-23 16:18
|
| dompurify |
CVE-2026-41240 |
中危 |
3.3.2 |
3.4.0 |
DOMPurify: DOMPurify: Cross-Site Scripting (XSS) via inconsistent tag sanitization
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41240
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-23 16:16 修改: 2026-04-29 14:58
|
| dompurify |
CVE-2026-41240 |
中危 |
3.3.2 |
3.4.0 |
DOMPurify: DOMPurify: Cross-Site Scripting (XSS) via inconsistent tag sanitization
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41240
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-23 16:16 修改: 2026-04-29 14:58
|
| dompurify |
CVE-2026-41240 |
中危 |
3.3.2 |
3.4.0 |
DOMPurify: DOMPurify: Cross-Site Scripting (XSS) via inconsistent tag sanitization
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41240
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-23 16:16 修改: 2026-04-29 14:58
|
| dompurify |
GHSA-39q2-94rc-95cp |
中危 |
3.3.2 |
3.4.0 |
DOMPurify's ADD_TAGS function form bypasses FORBID_TAGS due to short-circuit evaluation
漏洞详情: https://github.com/advisories/GHSA-39q2-94rc-95cp
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-16 00:46 修改: 2026-04-16 00:46
|
| dompurify |
GHSA-39q2-94rc-95cp |
中危 |
3.3.2 |
3.4.0 |
DOMPurify's ADD_TAGS function form bypasses FORBID_TAGS due to short-circuit evaluation
漏洞详情: https://github.com/advisories/GHSA-39q2-94rc-95cp
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-16 00:46 修改: 2026-04-16 00:46
|
| dompurify |
GHSA-39q2-94rc-95cp |
中危 |
3.3.2 |
3.4.0 |
DOMPurify's ADD_TAGS function form bypasses FORBID_TAGS due to short-circuit evaluation
漏洞详情: https://github.com/advisories/GHSA-39q2-94rc-95cp
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-16 00:46 修改: 2026-04-16 00:46
|
| dompurify |
CVE-2026-41238 |
中危 |
3.3.3 |
3.4.0 |
DOMPurify: DOMPurify: Cross-Site Scripting bypass via prototype pollution
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41238
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-23 16:16 修改: 2026-04-23 18:16
|
| dompurify |
CVE-2026-41238 |
中危 |
3.3.3 |
3.4.0 |
DOMPurify: DOMPurify: Cross-Site Scripting bypass via prototype pollution
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41238
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-23 16:16 修改: 2026-04-23 18:16
|
| dompurify |
CVE-2026-41239 |
中危 |
3.3.3 |
3.4.0 |
DOMPurify: Vue 2: DOMPurify: Cross-site scripting due to incomplete sanitization of template expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41239
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-23 16:16 修改: 2026-04-23 16:18
|
| dompurify |
CVE-2026-41239 |
中危 |
3.3.3 |
3.4.0 |
DOMPurify: Vue 2: DOMPurify: Cross-site scripting due to incomplete sanitization of template expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41239
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-23 16:16 修改: 2026-04-23 16:18
|
| dompurify |
CVE-2026-41240 |
中危 |
3.3.3 |
3.4.0 |
DOMPurify: DOMPurify: Cross-Site Scripting (XSS) via inconsistent tag sanitization
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41240
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-23 16:16 修改: 2026-04-29 14:58
|
| dompurify |
CVE-2026-41240 |
中危 |
3.3.3 |
3.4.0 |
DOMPurify: DOMPurify: Cross-Site Scripting (XSS) via inconsistent tag sanitization
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41240
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-23 16:16 修改: 2026-04-29 14:58
|
| dompurify |
GHSA-39q2-94rc-95cp |
中危 |
3.3.3 |
3.4.0 |
DOMPurify's ADD_TAGS function form bypasses FORBID_TAGS due to short-circuit evaluation
漏洞详情: https://github.com/advisories/GHSA-39q2-94rc-95cp
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-16 00:46 修改: 2026-04-16 00:46
|
| dompurify |
GHSA-39q2-94rc-95cp |
中危 |
3.3.3 |
3.4.0 |
DOMPurify's ADD_TAGS function form bypasses FORBID_TAGS due to short-circuit evaluation
漏洞详情: https://github.com/advisories/GHSA-39q2-94rc-95cp
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-16 00:46 修改: 2026-04-16 00:46
|
| axios |
CVE-2026-42037 |
中危 |
1.13.5 |
1.15.1 |
axios: Node.js: Axios: Information disclosure via CRLF injection in multipart Content-Type header
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42037
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-24 18:16 修改: 2026-04-27 19:54
|
| axios |
CVE-2026-42038 |
中危 |
1.13.5 |
1.15.1, 0.31.1 |
axios: Axios: Information disclosure due to `no_proxy` bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42038
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-24 18:16 修改: 2026-04-27 19:52
|
| axios |
CVE-2026-42039 |
中危 |
1.13.5 |
1.15.1, 0.31.1 |
axios: Node.js: Axios: Denial of Service via unbounded recursion in toFormData with deeply nested request data
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42039
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-24 18:16 修改: 2026-04-27 19:50
|
| axios |
CVE-2026-42041 |
中危 |
1.13.5 |
1.15.1, 0.31.1 |
axios: Axios: Authentication bypass due to prototype pollution of HTTP error handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42041
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-24 18:16 修改: 2026-04-27 20:07
|
| axios |
CVE-2026-42042 |
中危 |
1.13.5 |
1.15.1, 0.31.1 |
axios: Axios: XSRF token bypass leading to information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42042
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-24 18:16 修改: 2026-04-27 20:05
|
| axios |
CVE-2026-42044 |
中危 |
1.13.5 |
1.15.2 |
Axios is a promise based HTTP client for the browser and Node.js. From ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42044
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-24 18:16 修改: 2026-04-27 20:04
|
| axios |
CVE-2025-62718 |
中危 |
1.13.5 |
1.15.0, 0.31.0 |
axios: Axios: Server-Side Request Forgery and proxy bypass due to improper hostname normalization
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-62718
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-09 15:16 修改: 2026-04-16 19:16
|
| fast-xml-parser |
CVE-2026-41650 |
中危 |
5.5.9 |
5.7.0 |
fast-xml-parser XMLBuilder: XML Comment and CDATA Injection via Unescaped Delimiters
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41650
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-05-07 15:16 修改: 2026-05-12 20:30
|
| follow-redirects |
GHSA-r4q5-vmmm-2653 |
中危 |
1.15.11 |
1.16.0 |
follow-redirects leaks Custom Authentication Headers to Cross-Domain Redirect Targets
漏洞详情: https://github.com/advisories/GHSA-r4q5-vmmm-2653
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-14 01:11 修改: 2026-04-14 01:11
|
| ip-address |
CVE-2026-42338 |
中危 |
10.1.0 |
10.1.1 |
ip-address has XSS in Address6 HTML-emitting methods
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42338
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-05-12 20:16 修改: 2026-05-12 20:16
|
| ip-address |
CVE-2026-42338 |
中危 |
6.4.0 |
10.1.1 |
ip-address has XSS in Address6 HTML-emitting methods
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42338
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-05-12 20:16 修改: 2026-05-12 20:16
|
| protocol-buffers-schema |
CVE-2026-5758 |
中危 |
3.6.0 |
3.6.1 |
protocol-buffers-schema: protocol-buffers-schema: Remote code execution via prototype pollution
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5758
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-15 18:17 修改: 2026-04-17 15:17
|
| showdown |
CVE-2024-1899 |
中危 |
2.1.0 |
|
Showdown vulnerable to Regular Expression Denial of Service (ReDoS) in link/anchor parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-1899
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2024-02-26 19:15 修改: 2025-09-18 16:25
|
| @tootallnate/once |
CVE-2026-3449 |
低危 |
2.0.0 |
3.0.1 |
@tootallnate/once: @tootallnate/once: Denial of Service due to incorrect control flow scoping with AbortSignal
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3449
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-03-03 05:17 修改: 2026-04-29 01:00
|
| @tootallnate/once |
CVE-2026-3449 |
低危 |
2.0.0 |
3.0.1 |
@tootallnate/once: @tootallnate/once: Denial of Service due to incorrect control flow scoping with AbortSignal
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3449
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-03-03 05:17 修改: 2026-04-29 01:00
|
| axios |
CVE-2026-42040 |
低危 |
1.13.5 |
1.15.1, 0.31.1 |
Axios is a promise based HTTP client for the browser and Node.js. Prio ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42040
镜像层: sha256:b602bb5749aed56bc48a25f02f36214c69ffb965827e09ee0dd13c55ac1d1571
发布日期: 2026-04-24 18:16 修改: 2026-04-27 20:09
|