| fast-xml-parser |
CVE-2026-25896 |
严重 |
4.2.5 |
5.3.5, 4.5.4 |
fast-xml-parser: fast-xml-parser: Cross-Site Scripting (XSS) due to improper DOCTYPE entity handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-25896
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-20 21:19 修改: 2026-03-02 14:54
|
| form-data |
CVE-2025-7783 |
严重 |
2.3.3 |
2.5.4, 3.0.4, 4.0.4 |
form-data: Unsafe random function in form-data
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7783
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2025-07-18 17:15 修改: 2026-04-15 00:35
|
| @xmldom/xmldom |
CVE-2026-41673 |
高危 |
0.8.11 |
0.8.13, 0.9.10 |
xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41673
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-05-07 04:16 修改: 2026-05-07 15:16
|
| @xmldom/xmldom |
CVE-2026-41674 |
高危 |
0.8.11 |
0.8.13, 0.9.10 |
xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41674
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-05-07 04:16 修改: 2026-05-07 15:02
|
| @xmldom/xmldom |
CVE-2026-41675 |
高危 |
0.8.11 |
0.8.13, 0.9.10 |
xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41675
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-05-07 04:16 修改: 2026-05-07 15:16
|
| cross-spawn |
CVE-2024-21538 |
高危 |
7.0.3 |
7.0.5, 6.0.6 |
cross-spawn: regular expression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21538
镜像层: sha256:4983b93ee7967564f02cbf6162b75010ce557404a539fba05ee19a0eae01acbc
发布日期: 2024-11-08 05:15 修改: 2026-04-15 00:35
|
| defu |
CVE-2026-35209 |
高危 |
6.1.4 |
6.1.5 |
defu: Prototype pollution via `__proto__` key in defaults argument
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-35209
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-04-06 18:16 修改: 2026-04-27 23:47
|
| effect |
CVE-2026-32887 |
高危 |
3.18.4 |
3.20.0 |
Effect `AsyncLocalStorage` context lost/contaminated inside Effect fibers under concurrent load with RPC
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32887
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-20 22:16 修改: 2026-04-14 18:41
|
| express-rate-limit |
CVE-2026-30827 |
高危 |
8.2.1 |
8.2.2, 8.1.1, 8.0.2 |
express-rate-limit: express-rate-limit: Denial of Service for IPv4 clients due to incorrect IPv6 subnet masking
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-30827
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-07 06:16 修改: 2026-03-11 19:00
|
| fast-uri |
CVE-2026-6321 |
高危 |
3.1.0 |
3.1.1 |
fast-uri: fast-uri: Path traversal vulnerability allows bypass of security policies
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6321
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-05-04 20:16 修改: 2026-05-12 18:54
|
| fast-uri |
CVE-2026-6322 |
高危 |
3.1.0 |
3.1.2 |
fast-uri normalize() decoded percent-encoded authority delimiters insi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6322
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-05-05 11:16 修改: 2026-05-12 19:11
|
| @xmldom/xmldom |
CVE-2026-34601 |
高危 |
0.8.11 |
0.8.12, 0.9.9 |
xmldom: xmldom: XML structure injection via CDATA terminator
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-34601
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-04-02 18:16 修改: 2026-04-16 14:57
|
| fast-xml-parser |
CVE-2026-26278 |
高危 |
4.2.5 |
4.5.4, 5.3.6 |
fast-xml-parser: fast-xml-parser: Denial of Service via unlimited XML entity expansion
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-26278
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-19 20:25 修改: 2026-02-23 19:30
|
| fast-xml-parser |
CVE-2026-33036 |
高危 |
4.2.5 |
5.5.6, 4.5.5 |
fast-xml-parser: fast-xml-parser: Denial of Service via XML entity expansion bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33036
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-20 06:16 修改: 2026-03-23 16:28
|
| fast-xml-parser |
CVE-2026-33036 |
高危 |
5.3.6 |
5.5.6, 4.5.5 |
fast-xml-parser: fast-xml-parser: Denial of Service via XML entity expansion bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33036
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-20 06:16 修改: 2026-03-23 16:28
|
| flatted |
CVE-2026-32141 |
高危 |
3.3.3 |
3.4.0 |
flatted: flatted: Unbounded recursion DoS in parse() revive phase
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32141
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-12 18:16 修改: 2026-03-19 21:07
|
| flatted |
CVE-2026-33228 |
高危 |
3.3.3 |
3.4.2 |
flatted: Flatted: Prototype pollution vulnerability allows arbitrary code execution via crafted JSON.
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33228
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-20 23:16 修改: 2026-03-23 19:14
|
| @xmldom/xmldom |
CVE-2026-41672 |
高危 |
0.8.11 |
0.8.13, 0.9.10 |
xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41672
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-05-07 04:16 修改: 2026-05-07 16:16
|
| glob |
CVE-2025-64756 |
高危 |
10.4.2 |
11.1.0, 10.5.0 |
glob: glob: Command Injection Vulnerability via Malicious Filenames
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-64756
镜像层: sha256:4983b93ee7967564f02cbf6162b75010ce557404a539fba05ee19a0eae01acbc
发布日期: 2025-11-17 18:15 修改: 2025-12-02 19:34
|
| glob |
CVE-2025-64756 |
高危 |
10.4.5 |
11.1.0, 10.5.0 |
glob: glob: Command Injection Vulnerability via Malicious Filenames
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-64756
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2025-11-17 18:15 修改: 2025-12-02 19:34
|
| lodash |
CVE-2026-4800 |
高危 |
4.17.21 |
4.18.0 |
lodash: lodash: Arbitrary code execution via untrusted input in template imports
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4800
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-31 20:16 修改: 2026-05-01 18:09
|
| minimatch |
CVE-2026-26996 |
高危 |
10.1.2 |
10.2.1, 9.0.6, 8.0.5, 7.4.7, 6.2.1, 5.1.7, 4.2.4, 3.1.3 |
minimatch: minimatch: Denial of Service via specially crafted glob patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-26996
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-20 03:16 修改: 2026-03-06 21:32
|
| minimatch |
CVE-2026-27903 |
高危 |
10.1.2 |
10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.3 |
minimatch: minimatch: Denial of Service due to unbounded recursive backtracking via crafted glob patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27903
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-26 02:16 修改: 2026-02-27 17:21
|
| minimatch |
CVE-2026-27904 |
高危 |
10.1.2 |
10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.4 |
minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27904
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-26 02:16 修改: 2026-02-27 17:16
|
| minimatch |
CVE-2026-26996 |
高危 |
3.1.2 |
10.2.1, 9.0.6, 8.0.5, 7.4.7, 6.2.1, 5.1.7, 4.2.4, 3.1.3 |
minimatch: minimatch: Denial of Service via specially crafted glob patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-26996
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-20 03:16 修改: 2026-03-06 21:32
|
| minimatch |
CVE-2026-27903 |
高危 |
3.1.2 |
10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.3 |
minimatch: minimatch: Denial of Service due to unbounded recursive backtracking via crafted glob patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27903
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-26 02:16 修改: 2026-02-27 17:21
|
| minimatch |
CVE-2026-27904 |
高危 |
3.1.2 |
10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.4 |
minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27904
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-26 02:16 修改: 2026-02-27 17:16
|
| minimatch |
CVE-2026-26996 |
高危 |
5.1.6 |
10.2.1, 9.0.6, 8.0.5, 7.4.7, 6.2.1, 5.1.7, 4.2.4, 3.1.3 |
minimatch: minimatch: Denial of Service via specially crafted glob patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-26996
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-20 03:16 修改: 2026-03-06 21:32
|
| minimatch |
CVE-2026-26996 |
高危 |
5.1.6 |
10.2.1, 9.0.6, 8.0.5, 7.4.7, 6.2.1, 5.1.7, 4.2.4, 3.1.3 |
minimatch: minimatch: Denial of Service via specially crafted glob patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-26996
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-20 03:16 修改: 2026-03-06 21:32
|
| minimatch |
CVE-2026-27903 |
高危 |
5.1.6 |
10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.3 |
minimatch: minimatch: Denial of Service due to unbounded recursive backtracking via crafted glob patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27903
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-26 02:16 修改: 2026-02-27 17:21
|
| minimatch |
CVE-2026-27903 |
高危 |
5.1.6 |
10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.3 |
minimatch: minimatch: Denial of Service due to unbounded recursive backtracking via crafted glob patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27903
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-26 02:16 修改: 2026-02-27 17:21
|
| minimatch |
CVE-2026-27904 |
高危 |
5.1.6 |
10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.4 |
minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27904
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-26 02:16 修改: 2026-02-27 17:16
|
| minimatch |
CVE-2026-27904 |
高危 |
5.1.6 |
10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.4 |
minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27904
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-26 02:16 修改: 2026-02-27 17:16
|
| minimatch |
CVE-2026-26996 |
高危 |
9.0.5 |
10.2.1, 9.0.6, 8.0.5, 7.4.7, 6.2.1, 5.1.7, 4.2.4, 3.1.3 |
minimatch: minimatch: Denial of Service via specially crafted glob patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-26996
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-20 03:16 修改: 2026-03-06 21:32
|
| minimatch |
CVE-2026-26996 |
高危 |
9.0.5 |
10.2.1, 9.0.6, 8.0.5, 7.4.7, 6.2.1, 5.1.7, 4.2.4, 3.1.3 |
minimatch: minimatch: Denial of Service via specially crafted glob patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-26996
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-20 03:16 修改: 2026-03-06 21:32
|
| minimatch |
CVE-2026-26996 |
高危 |
9.0.5 |
10.2.1, 9.0.6, 8.0.5, 7.4.7, 6.2.1, 5.1.7, 4.2.4, 3.1.3 |
minimatch: minimatch: Denial of Service via specially crafted glob patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-26996
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-20 03:16 修改: 2026-03-06 21:32
|
| minimatch |
CVE-2026-26996 |
高危 |
9.0.5 |
10.2.1, 9.0.6, 8.0.5, 7.4.7, 6.2.1, 5.1.7, 4.2.4, 3.1.3 |
minimatch: minimatch: Denial of Service via specially crafted glob patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-26996
镜像层: sha256:4983b93ee7967564f02cbf6162b75010ce557404a539fba05ee19a0eae01acbc
发布日期: 2026-02-20 03:16 修改: 2026-03-06 21:32
|
| minimatch |
CVE-2026-27903 |
高危 |
9.0.5 |
10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.3 |
minimatch: minimatch: Denial of Service due to unbounded recursive backtracking via crafted glob patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27903
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-26 02:16 修改: 2026-02-27 17:21
|
| minimatch |
CVE-2026-27903 |
高危 |
9.0.5 |
10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.3 |
minimatch: minimatch: Denial of Service due to unbounded recursive backtracking via crafted glob patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27903
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-26 02:16 修改: 2026-02-27 17:21
|
| minimatch |
CVE-2026-27903 |
高危 |
9.0.5 |
10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.3 |
minimatch: minimatch: Denial of Service due to unbounded recursive backtracking via crafted glob patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27903
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-26 02:16 修改: 2026-02-27 17:21
|
| minimatch |
CVE-2026-27903 |
高危 |
9.0.5 |
10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.3 |
minimatch: minimatch: Denial of Service due to unbounded recursive backtracking via crafted glob patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27903
镜像层: sha256:4983b93ee7967564f02cbf6162b75010ce557404a539fba05ee19a0eae01acbc
发布日期: 2026-02-26 02:16 修改: 2026-02-27 17:21
|
| minimatch |
CVE-2026-27904 |
高危 |
9.0.5 |
10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.4 |
minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27904
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-26 02:16 修改: 2026-02-27 17:16
|
| minimatch |
CVE-2026-27904 |
高危 |
9.0.5 |
10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.4 |
minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27904
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-26 02:16 修改: 2026-02-27 17:16
|
| minimatch |
CVE-2026-27904 |
高危 |
9.0.5 |
10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.4 |
minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27904
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-26 02:16 修改: 2026-02-27 17:16
|
| minimatch |
CVE-2026-27904 |
高危 |
9.0.5 |
10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.4 |
minimatch: Minimatch: Denial of Service via catastrophic backtracking in glob expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27904
镜像层: sha256:4983b93ee7967564f02cbf6162b75010ce557404a539fba05ee19a0eae01acbc
发布日期: 2026-02-26 02:16 修改: 2026-02-27 17:16
|
| next |
CVE-2026-44573 |
高危 |
15.5.7 |
15.5.16, 16.2.5 |
Next.js has a Middleware / Proxy bypass in Pages Router applications using i18n
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44573
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| next |
CVE-2026-44574 |
高危 |
15.5.7 |
15.5.16, 16.2.5 |
Next.js has a Middleware / Proxy bypass through dynamic route parameter injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44574
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| next |
CVE-2026-44575 |
高危 |
15.5.7 |
15.5.16, 16.2.5 |
Next.js has a Middleware / Proxy bypass in App Router applications via segment-prefetch routes
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44575
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| next |
CVE-2026-44578 |
高危 |
15.5.7 |
15.5.16, 16.2.5 |
Next.js vulnerable to server-side request forgery in applications using WebSocket upgrades
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44578
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| next |
CVE-2026-44579 |
高危 |
15.5.7 |
15.5.16, 16.2.5 |
Next.js vulnerable to Denial of Service via connection exhaustion in applications using Cache Components
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44579
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| next |
CVE-2026-45109 |
高危 |
15.5.7 |
15.5.18, 16.2.6 |
Next.js has a Middleware / Proxy bypass in App Router applications via segment-prefetch routes - Incomplete Fix Follow-Up
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-45109
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| next |
GHSA-8h8q-6873-q5fj |
高危 |
15.5.7 |
15.5.16, 16.2.5 |
Next.js Vulnerable to Denial of Service with Server Components
漏洞详情: https://github.com/advisories/GHSA-8h8q-6873-q5fj
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-05-11 14:50 修改: 2026-05-11 14:50
|
| next |
GHSA-h25m-26qc-wcjf |
高危 |
15.5.7 |
15.0.8, 15.1.12, 15.2.9, 15.3.9, 15.4.11, 15.5.10, 15.6.0-canary.61, 16.0.11, 16.1.5 |
Next.js HTTP request deserialization can lead to DoS when using insecure React Server Components
漏洞详情: https://github.com/advisories/GHSA-h25m-26qc-wcjf
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-01-28 15:38 修改: 2026-01-28 15:38
|
| next |
GHSA-mwv6-3258-q52c |
高危 |
15.5.7 |
14.2.34, 15.0.6, 15.1.10, 15.2.7, 15.3.7, 15.4.9, 15.5.8, 15.6.0-canary.59, 16.0.9, 16.1.0-canary.17 |
Next Vulnerable to Denial of Service with Server Components
漏洞详情: https://github.com/advisories/GHSA-mwv6-3258-q52c
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2025-12-11 22:49 修改: 2025-12-11 22:49
|
| next |
GHSA-q4gf-8mx6-v5v3 |
高危 |
15.5.7 |
15.5.15, 16.2.3 |
Next.js has a Denial of Service with Server Components
漏洞详情: https://github.com/advisories/GHSA-q4gf-8mx6-v5v3
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-04-10 15:35 修改: 2026-04-10 15:35
|
| path-to-regexp |
CVE-2026-4926 |
高危 |
8.3.0 |
8.4.0 |
path-to-regexp: path-to-regexp: Denial of Service via crafted regular expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4926
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-26 19:17 修改: 2026-04-16 18:04
|
| picomatch |
CVE-2026-33671 |
高危 |
2.3.1 |
4.0.4, 3.0.2, 2.3.2 |
picomatch: Picomatch: Regular Expression Denial of Service via crafted extglob patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33671
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-26 22:16 修改: 2026-04-01 13:45
|
| picomatch |
CVE-2026-33671 |
高危 |
4.0.3 |
4.0.4, 3.0.2, 2.3.2 |
picomatch: Picomatch: Regular Expression Denial of Service via crafted extglob patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33671
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-26 22:16 修改: 2026-04-01 13:45
|
| picomatch |
CVE-2026-33671 |
高危 |
4.0.3 |
4.0.4, 3.0.2, 2.3.2 |
picomatch: Picomatch: Regular Expression Denial of Service via crafted extglob patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33671
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-26 22:16 修改: 2026-04-01 13:45
|
| preact |
CVE-2026-22028 |
高危 |
10.27.2 |
10.26.10, 10.27.3, 10.28.2 |
preact: Preact: Arbitrary script execution via JSON serialization protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-22028
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-01-08 15:15 修改: 2026-01-12 18:58
|
| rollup |
CVE-2026-27606 |
高危 |
4.57.1 |
2.80.0, 3.30.0, 4.59.0 |
rollup: Rollup: Remote Code Execution via Path Traversal Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27606
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-25 03:16 修改: 2026-02-25 16:05
|
| serialize-javascript |
GHSA-5c6j-r48x-rmvq |
高危 |
6.0.2 |
7.0.3 |
Serialize JavaScript is Vulnerable to RCE via RegExp.flags and Date.prototype.toISOString()
漏洞详情: https://github.com/advisories/GHSA-5c6j-r48x-rmvq
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-28 02:50 修改: 2026-03-02 16:17
|
| tar |
CVE-2026-23745 |
高危 |
6.2.1 |
7.5.3 |
node-tar: tar: node-tar: Arbitrary file overwrite and symlink poisoning via unsanitized linkpaths in archives
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-23745
镜像层: sha256:4983b93ee7967564f02cbf6162b75010ce557404a539fba05ee19a0eae01acbc
发布日期: 2026-01-16 22:16 修改: 2026-02-18 16:20
|
| tar |
CVE-2026-23950 |
高危 |
6.2.1 |
7.5.4 |
node-tar: tar: node-tar: Arbitrary file overwrite via Unicode path collision race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-23950
镜像层: sha256:4983b93ee7967564f02cbf6162b75010ce557404a539fba05ee19a0eae01acbc
发布日期: 2026-01-20 01:15 修改: 2026-02-18 15:50
|
| tar |
CVE-2026-24842 |
高危 |
6.2.1 |
7.5.7 |
node-tar: tar: node-tar: Arbitrary file creation via path traversal bypass in hardlink security check
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-24842
镜像层: sha256:4983b93ee7967564f02cbf6162b75010ce557404a539fba05ee19a0eae01acbc
发布日期: 2026-01-28 01:16 修改: 2026-02-02 14:30
|
| tar |
CVE-2026-26960 |
高危 |
6.2.1 |
7.5.8 |
node-tar: node-tar: Arbitrary file read/write via malicious archive hardlink creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-26960
镜像层: sha256:4983b93ee7967564f02cbf6162b75010ce557404a539fba05ee19a0eae01acbc
发布日期: 2026-02-20 02:16 修改: 2026-02-20 19:24
|
| tar |
CVE-2026-29786 |
高危 |
6.2.1 |
7.5.10 |
node-tar: hardlink path traversal via drive-relative linkpath
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-29786
镜像层: sha256:4983b93ee7967564f02cbf6162b75010ce557404a539fba05ee19a0eae01acbc
发布日期: 2026-03-07 16:15 修改: 2026-03-11 21:50
|
| tar |
CVE-2026-31802 |
高危 |
6.2.1 |
7.5.11 |
tar: tar: File overwrite via drive-relative symlink traversal
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-31802
镜像层: sha256:4983b93ee7967564f02cbf6162b75010ce557404a539fba05ee19a0eae01acbc
发布日期: 2026-03-10 07:44 修改: 2026-03-18 18:13
|
| tar |
CVE-2026-23745 |
高危 |
7.5.1 |
7.5.3 |
node-tar: tar: node-tar: Arbitrary file overwrite and symlink poisoning via unsanitized linkpaths in archives
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-23745
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-01-16 22:16 修改: 2026-02-18 16:20
|
| tar |
CVE-2026-23950 |
高危 |
7.5.1 |
7.5.4 |
node-tar: tar: node-tar: Arbitrary file overwrite via Unicode path collision race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-23950
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-01-20 01:15 修改: 2026-02-18 15:50
|
| tar |
CVE-2026-24842 |
高危 |
7.5.1 |
7.5.7 |
node-tar: tar: node-tar: Arbitrary file creation via path traversal bypass in hardlink security check
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-24842
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-01-28 01:16 修改: 2026-02-02 14:30
|
| tar |
CVE-2026-26960 |
高危 |
7.5.1 |
7.5.8 |
node-tar: node-tar: Arbitrary file read/write via malicious archive hardlink creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-26960
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-20 02:16 修改: 2026-02-20 19:24
|
| tar |
CVE-2026-29786 |
高危 |
7.5.1 |
7.5.10 |
node-tar: hardlink path traversal via drive-relative linkpath
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-29786
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-07 16:15 修改: 2026-03-11 21:50
|
| tar |
CVE-2026-31802 |
高危 |
7.5.1 |
7.5.11 |
tar: tar: File overwrite via drive-relative symlink traversal
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-31802
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-10 07:44 修改: 2026-03-18 18:13
|
| underscore |
CVE-2026-27601 |
高危 |
1.13.7 |
1.13.8 |
Underscore.js: Underscore.js: Denial of Service via recursive data structures in flatten and isEqual functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27601
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-03 23:15 修改: 2026-04-28 15:06
|
| undici |
CVE-2026-1526 |
高危 |
7.22.0 |
6.24.0, 7.24.0 |
undici: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-1526
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-12 21:16 修改: 2026-03-20 15:56
|
| undici |
CVE-2026-1528 |
高危 |
7.22.0 |
6.24.0, 7.24.0 |
undici: undici: Denial of Service via crafted WebSocket frame with large length
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-1528
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-12 21:16 修改: 2026-03-20 15:41
|
| undici |
CVE-2026-2229 |
高危 |
7.22.0 |
6.24.0, 7.24.0 |
undici: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-2229
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-12 21:16 修改: 2026-03-20 15:39
|
| hono |
GHSA-26pp-8wgv-hjvm |
中危 |
4.12.5 |
4.12.12 |
Hono missing validation of cookie name on write path in setCookie()
漏洞详情: https://github.com/advisories/GHSA-26pp-8wgv-hjvm
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-04-08 00:17 修改: 2026-04-08 00:17
|
| hono |
GHSA-458j-xx4x-4375 |
中危 |
4.12.5 |
4.12.14 |
hono Improperly Handles JSX Attribute Names Allows HTML Injection in hono/jsx SSR
漏洞详情: https://github.com/advisories/GHSA-458j-xx4x-4375
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-04-16 01:02 修改: 2026-04-16 01:02
|
| hono |
GHSA-v8w9-8mx6-g223 |
中危 |
4.12.5 |
4.12.7 |
Hono vulnerable to Prototype Pollution possible through __proto__ key allowed in parseBody({ dot: true })
漏洞详情: https://github.com/advisories/GHSA-v8w9-8mx6-g223
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-11 00:31 修改: 2026-03-11 00:31
|
| ip-address |
CVE-2026-42338 |
中危 |
10.0.1 |
10.1.1 |
ip-address has XSS in Address6 HTML-emitting methods
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42338
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-05-12 20:16 修改: 2026-05-12 20:16
|
| ip-address |
CVE-2026-42338 |
中危 |
9.0.5 |
10.1.1 |
ip-address has XSS in Address6 HTML-emitting methods
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42338
镜像层: sha256:4983b93ee7967564f02cbf6162b75010ce557404a539fba05ee19a0eae01acbc
发布日期: 2026-05-12 20:16 修改: 2026-05-12 20:16
|
| js-yaml |
CVE-2025-64718 |
中危 |
4.1.0 |
4.1.1, 3.14.2 |
js-yaml: js-yaml prototype pollution in merge
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-64718
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2025-11-13 16:15 修改: 2026-02-02 12:54
|
| esbuild |
GHSA-67mh-4wv8-2f99 |
中危 |
0.21.5 |
0.25.0 |
esbuild enables any website to send any requests to the development server and read the response
漏洞详情: https://github.com/advisories/GHSA-67mh-4wv8-2f99
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2025-02-10 17:48 修改: 2025-02-10 17:48
|
| lodash |
CVE-2025-13465 |
中危 |
4.17.21 |
4.17.23 |
lodash: prototype pollution in _.unset and _.omit functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13465
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-01-21 20:16 修改: 2026-02-17 17:10
|
| lodash |
CVE-2026-2950 |
中危 |
4.17.21 |
4.18.0 |
lodash: Lodash: Prototype pollution allows deletion of built-in prototype properties via array path bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-2950
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-31 20:16 修改: 2026-04-07 16:12
|
| ajv |
CVE-2025-69873 |
中危 |
7.2.4 |
8.18.0, 6.14.0 |
ajv: ReDoS via $data reference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69873
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-11 19:15 修改: 2026-04-15 00:35
|
| next |
CVE-2025-59471 |
中危 |
15.5.7 |
15.5.10, 16.1.5 |
next: NextJS Denial of Service in Image Optimizer
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-59471
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-01-26 22:15 修改: 2026-02-13 15:03
|
| next |
CVE-2026-27980 |
中危 |
15.5.7 |
16.1.7, 15.5.14 |
next.js: Next.js: Unbounded next/image disk cache growth can exhaust storage
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27980
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-18 01:16 修改: 2026-03-18 19:52
|
| next |
CVE-2026-29057 |
中危 |
15.5.7 |
16.1.7, 15.5.13 |
next.js: Next.js: HTTP request smuggling in rewrites
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-29057
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-18 01:16 修改: 2026-03-18 19:49
|
| next |
CVE-2026-44576 |
中危 |
15.5.7 |
15.5.16, 16.2.5 |
Next.js vulnerable to cache poisoning in React Server Component responses
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44576
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| next |
CVE-2026-44577 |
中危 |
15.5.7 |
15.5.16, 16.2.5 |
Next.js has a Denial of Service in the Image Optimization API
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44577
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| next |
CVE-2026-44580 |
中危 |
15.5.7 |
15.5.16, 16.2.5 |
Next.js has cross-site scripting in beforeInteractive scripts with untrusted input
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44580
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| next |
CVE-2026-44581 |
中危 |
15.5.7 |
15.5.16, 16.2.5 |
Next.js vulnerable to cross-site scripting in App Router applications using CSP nonces
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44581
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| next |
GHSA-w37m-7fhw-fmv9 |
中危 |
15.5.7 |
15.0.6, 15.1.10, 15.2.7, 15.3.7, 15.4.9, 15.5.8, 15.6.0-canary.59, 16.0.9, 16.1.0-canary.17 |
Next Server Actions Source Code Exposure
漏洞详情: https://github.com/advisories/GHSA-w37m-7fhw-fmv9
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2025-12-11 22:49 修改: 2025-12-11 22:49
|
| next-auth |
GHSA-5jpx-9hw9-2fx4 |
中危 |
4.24.11 |
4.24.12, 5.0.0-beta.30 |
NextAuthjs Email misdelivery Vulnerability
漏洞详情: https://github.com/advisories/GHSA-5jpx-9hw9-2fx4
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2025-10-29 10:43 修改: 2025-10-29 10:43
|
| next-intl |
CVE-2026-40299 |
中危 |
4.7.0 |
4.9.1 |
next-intl: next-intl: Open Redirect vulnerability allows off-site redirection via crafted URLs
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40299
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-04-17 21:16 修改: 2026-04-29 21:04
|
| next-intl |
GHSA-4c35-wcg5-mm9h |
中危 |
4.7.0 |
4.9.2 |
next-intl has prototype pollution with `experimental.messages.precompile` via attacker-controlled translation catalog keys
漏洞详情: https://github.com/advisories/GHSA-4c35-wcg5-mm9h
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-05-06 17:34 修改: 2026-05-06 17:34
|
| ajv |
CVE-2025-69873 |
中危 |
8.17.1 |
8.18.0, 6.14.0 |
ajv: ReDoS via $data reference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69873
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-11 19:15 修改: 2026-04-15 00:35
|
| path-to-regexp |
CVE-2026-4923 |
中危 |
8.3.0 |
8.4.0 |
path-to-regexp: path-to-regexp: Denial of Service via specially crafted paths with multiple wildcards
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4923
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-26 19:17 修改: 2026-04-16 18:03
|
| brace-expansion |
CVE-2026-33750 |
中危 |
1.1.12 |
5.0.5, 3.0.2, 2.0.3, 1.1.13 |
brace-expansion: brace-expansion: Denial of Service via zero step value in brace pattern
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33750
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-27 15:16 修改: 2026-04-22 14:23
|
| picomatch |
CVE-2026-33672 |
中危 |
2.3.1 |
4.0.4, 3.0.2, 2.3.2 |
picomatch: Picomatch: Data integrity compromised via method injection with crafted POSIX bracket expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33672
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-26 22:16 修改: 2026-04-01 13:44
|
| brace-expansion |
CVE-2026-33750 |
中危 |
2.0.1 |
5.0.5, 3.0.2, 2.0.3, 1.1.13 |
brace-expansion: brace-expansion: Denial of Service via zero step value in brace pattern
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33750
镜像层: sha256:4983b93ee7967564f02cbf6162b75010ce557404a539fba05ee19a0eae01acbc
发布日期: 2026-03-27 15:16 修改: 2026-04-22 14:23
|
| brace-expansion |
CVE-2026-33750 |
中危 |
2.0.2 |
5.0.5, 3.0.2, 2.0.3, 1.1.13 |
brace-expansion: brace-expansion: Denial of Service via zero step value in brace pattern
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33750
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-27 15:16 修改: 2026-04-22 14:23
|
| picomatch |
CVE-2026-33672 |
中危 |
4.0.3 |
4.0.4, 3.0.2, 2.3.2 |
picomatch: Picomatch: Data integrity compromised via method injection with crafted POSIX bracket expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33672
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-26 22:16 修改: 2026-04-01 13:44
|
| picomatch |
CVE-2026-33672 |
中危 |
4.0.3 |
4.0.4, 3.0.2, 2.3.2 |
picomatch: Picomatch: Data integrity compromised via method injection with crafted POSIX bracket expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33672
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-26 22:16 修改: 2026-04-01 13:44
|
| postcss |
CVE-2026-41305 |
中危 |
8.4.31 |
8.5.10 |
postcss: PostCSS: Cross-Site Scripting (XSS) via improper escaping of style closing tags
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41305
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-04-24 03:16 修改: 2026-04-24 17:16
|
| postcss |
CVE-2026-41305 |
中危 |
8.5.6 |
8.5.10 |
postcss: PostCSS: Cross-Site Scripting (XSS) via improper escaping of style closing tags
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41305
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-04-24 03:16 修改: 2026-04-24 17:16
|
| brace-expansion |
CVE-2026-33750 |
中危 |
2.0.2 |
5.0.5, 3.0.2, 2.0.3, 1.1.13 |
brace-expansion: brace-expansion: Denial of Service via zero step value in brace pattern
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33750
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-27 15:16 修改: 2026-04-22 14:23
|
| qs |
CVE-2025-15284 |
中危 |
6.5.3 |
6.14.1 |
qs: qs: Denial of Service via improper input validation in array parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15284
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2025-12-29 23:15 修改: 2026-02-26 19:57
|
| request |
CVE-2023-28155 |
中危 |
2.88.2 |
|
request: bypass of SSRF mitigations when following a cross-protocol redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28155
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2023-03-16 15:15 修改: 2024-11-21 07:54
|
| fast-xml-parser |
CVE-2026-33349 |
中危 |
4.2.5 |
4.5.5, 5.5.7 |
fast-xml-parser: fast-xml-parser: Denial of Service via unbounded entity expansion due to incorrect configuration limit handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33349
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-24 20:16 修改: 2026-03-26 13:01
|
| fast-xml-parser |
CVE-2026-41650 |
中危 |
4.2.5 |
5.7.0 |
fast-xml-parser XMLBuilder: XML Comment and CDATA Injection via Unescaped Delimiters
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41650
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-05-07 15:16 修改: 2026-05-12 20:30
|
| serialize-javascript |
CVE-2026-34043 |
中危 |
6.0.2 |
7.0.5 |
serialize-javascript: serialize-javascript: Denial of Service via specially crafted array-like object serialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-34043
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-31 03:15 修改: 2026-04-03 16:53
|
| brace-expansion |
CVE-2026-33750 |
中危 |
2.0.2 |
5.0.5, 3.0.2, 2.0.3, 1.1.13 |
brace-expansion: brace-expansion: Denial of Service via zero step value in brace pattern
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33750
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-27 15:16 修改: 2026-04-22 14:23
|
| fast-xml-parser |
CVE-2026-33349 |
中危 |
5.3.6 |
4.5.5, 5.5.7 |
fast-xml-parser: fast-xml-parser: Denial of Service via unbounded entity expansion due to incorrect configuration limit handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33349
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-24 20:16 修改: 2026-03-26 13:01
|
| fast-xml-parser |
CVE-2026-41650 |
中危 |
5.3.6 |
5.7.0 |
fast-xml-parser XMLBuilder: XML Comment and CDATA Injection via Unescaped Delimiters
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41650
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-05-07 15:16 修改: 2026-05-12 20:30
|
| brace-expansion |
CVE-2026-33750 |
中危 |
2.0.2 |
5.0.5, 3.0.2, 2.0.3, 1.1.13 |
brace-expansion: brace-expansion: Denial of Service via zero step value in brace pattern
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33750
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-27 15:16 修改: 2026-04-22 14:23
|
| brace-expansion |
CVE-2026-33750 |
中危 |
2.0.2 |
5.0.5, 3.0.2, 2.0.3, 1.1.13 |
brace-expansion: brace-expansion: Denial of Service via zero step value in brace pattern
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33750
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-27 15:16 修改: 2026-04-22 14:23
|
| @hono/node-server |
CVE-2026-39406 |
中危 |
1.19.11 |
1.19.13 |
@hono/node-server: Middleware bypass via repeated slashes in serveStatic
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39406
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-04-08 15:16 修改: 2026-04-21 18:38
|
| ajv |
CVE-2025-69873 |
中危 |
6.12.6 |
8.18.0, 6.14.0 |
ajv: ReDoS via $data reference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69873
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-11 19:15 修改: 2026-04-15 00:35
|
| ajv |
CVE-2025-69873 |
中危 |
7.2.4 |
8.18.0, 6.14.0 |
ajv: ReDoS via $data reference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69873
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-11 19:15 修改: 2026-04-15 00:35
|
| hono |
CVE-2026-39407 |
中危 |
4.12.5 |
4.12.12 |
Hono: Middleware bypass via repeated slashes in serveStatic
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39407
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-04-08 15:16 修改: 2026-04-21 18:36
|
| hono |
CVE-2026-39408 |
中危 |
4.12.5 |
4.12.12 |
Hono: Path traversal in toSSG() allows writing files outside the output directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39408
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-04-08 15:16 修改: 2026-04-21 18:31
|
| hono |
CVE-2026-39409 |
中危 |
4.12.5 |
4.12.12 |
Hono has incorrect IP matching in ipRestriction() for IPv4-mapped IPv6 addresses
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39409
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-04-08 15:16 修改: 2026-04-21 18:30
|
| hono |
CVE-2026-39410 |
中危 |
4.12.5 |
4.12.12 |
Hono: Non-breaking space prefix bypass in cookie name handling in getCookie()
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39410
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-04-08 15:16 修改: 2026-04-21 18:26
|
| tar |
CVE-2025-64118 |
中危 |
7.5.1 |
7.5.2 |
node-tar: tar: node-tar: Information disclosure via reading a truncated tar file
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-64118
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2025-10-30 18:15 修改: 2026-04-15 00:35
|
| tough-cookie |
CVE-2023-26136 |
中危 |
2.5.0 |
4.1.3 |
tough-cookie: prototype pollution in cookie memstore
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26136
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2023-07-01 05:15 修改: 2024-11-21 07:50
|
| hono |
CVE-2026-44455 |
中危 |
4.12.5 |
4.12.16 |
hono/jsx has Unvalidated JSX Tag Names that May Allow HTML Injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44455
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| hono |
CVE-2026-44456 |
中危 |
4.12.5 |
4.12.16 |
Hono: bodyLimit() can be bypassed for chunked / unknown-length requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44456
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| hono |
CVE-2026-44457 |
中危 |
4.12.5 |
4.12.18 |
Hono's Cache Middleware ignores Vary: Authorization / Vary: Cookie leading to cross-user cache leakage
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44457
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| hono |
CVE-2026-44458 |
中危 |
4.12.5 |
4.12.18 |
Hono has CSS Declaration Injection via Style Object Values in JSX SSR
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44458
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| undici |
CVE-2026-1525 |
中危 |
7.22.0 |
6.24.0, 7.24.0 |
undici: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-1525
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-12 20:16 修改: 2026-03-19 17:29
|
| undici |
CVE-2026-1527 |
中危 |
7.22.0 |
6.24.0, 7.24.0 |
undici: Undici: HTTP header injection and request smuggling vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-1527
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-12 21:16 修改: 2026-03-20 15:49
|
| undici |
CVE-2026-2581 |
中危 |
7.22.0 |
7.24.0 |
undici: Undici: Denial of Service due to uncontrolled resource consumption
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-2581
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-03-12 21:16 修改: 2026-03-18 13:37
|
| uuid |
CVE-2026-41907 |
中危 |
11.1.0 |
11.1.1, 12.0.1, 13.0.1 |
uuid: uuid: Out-of-bounds write vulnerability impacts data integrity and confidentiality
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41907
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-04-24 19:17 修改: 2026-05-11 13:53
|
| vite |
CVE-2026-39365 |
中危 |
5.4.21 |
8.0.5, 7.3.2, 6.4.2 |
vite: Vite: Information disclosure via path traversal in dev server's .map request handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39365
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-04-07 20:16 修改: 2026-04-30 18:34
|
| hono |
CVE-2026-44459 |
低危 |
4.12.5 |
4.12.18 |
Hono has improper validation of NumericDate claims (exp, nbf, iat) in JWT verify()
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44459
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| brace-expansion |
CVE-2025-5889 |
低危 |
2.0.1 |
2.0.2, 1.1.12, 3.0.1, 4.0.1 |
brace-expansion: juliangruber brace-expansion index.js expand redos
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5889
镜像层: sha256:4983b93ee7967564f02cbf6162b75010ce557404a539fba05ee19a0eae01acbc
发布日期: 2025-06-09 19:15 修改: 2026-04-29 01:00
|
| diff |
CVE-2026-24001 |
低危 |
5.2.0 |
8.0.3, 5.2.2, 4.0.4, 3.5.1 |
jsdiff: denial of service vulnerability in parsePatch and applyPatch
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-24001
镜像层: sha256:4983b93ee7967564f02cbf6162b75010ce557404a539fba05ee19a0eae01acbc
发布日期: 2026-01-22 03:15 修改: 2026-03-04 15:23
|
| fast-xml-parser |
CVE-2026-27942 |
低危 |
4.2.5 |
5.3.8, 4.5.4 |
fast-xml-parser: fast-xml-parser: Stack overflow leads to Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27942
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-26 02:16 修改: 2026-03-02 14:54
|
| next |
CVE-2026-44572 |
低危 |
15.5.7 |
15.5.16, 16.2.5 |
Next.js's Middleware / Proxy redirects can be cache-poisoned
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44572
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| next |
CVE-2026-44582 |
低危 |
15.5.7 |
15.5.16, 16.2.5 |
Next.js vulnerable to cache poisoning via collisions in React Server Component cache-busting
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44582
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| qs |
CVE-2026-2391 |
低危 |
6.14.1 |
6.14.2 |
qs: qs's arrayLimit bypass in comma parsing allows denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-2391
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-12 05:17 修改: 2026-02-24 20:13
|
| qs |
CVE-2026-2391 |
低危 |
6.14.1 |
6.14.2 |
qs: qs's arrayLimit bypass in comma parsing allows denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-2391
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-12 05:17 修改: 2026-02-24 20:13
|
| fast-xml-parser |
CVE-2026-27942 |
低危 |
5.3.6 |
5.3.8, 4.5.4 |
fast-xml-parser: fast-xml-parser: Stack overflow leads to Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27942
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-26 02:16 修改: 2026-03-02 14:54
|
| webpack |
CVE-2025-68157 |
低危 |
5.96.1 |
5.104.0 |
webpack: webpack buildHttp HttpUriPlugin allowedUris bypass via HTTP redirects
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68157
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-05 23:15 修改: 2026-02-13 19:21
|
| webpack |
CVE-2025-68458 |
低危 |
5.96.1 |
5.104.1 |
webpack: webpack buildHttp: allowedUris allow-list bypass via URL userinfo (@) leading to build-time SSRF behavior
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68458
镜像层: sha256:6ddf7dd3f51d0eb8cf3ddcf90f90dae23bd4a0cefba1c259440da4195ed0bd52
发布日期: 2026-02-05 23:15 修改: 2026-02-13 19:16
|