| @xmldom/xmldom |
CVE-2026-34601 |
HIGH |
0.8.10 |
0.8.12, 0.9.9 |
https://github.com/xmldom/xmldom
https://github.com/xmldom/xmldom/commit/2b852e836ab86dbbd6cbaf0537f584dd0b5ac184
https://github.com/xmldom/xmldom/releases/tag/0.8.12
https://github.com/xmldom/xmldom/releases/tag/0.9.9
https://github.com/xmldom/xmldom/security/advisories/GHSA-wh4c-j3r5-mjhp
|
| ansi-regex |
CVE-2021-3807 |
HIGH |
3.0.0 |
6.0.1, 5.0.1, 4.1.1, 3.0.1 |
https://access.redhat.com/errata/RHSA-2022:6595
https://access.redhat.com/security/cve/CVE-2021-3807
https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908
https://bugzilla.redhat.com/1907444
https://bugzilla.redhat.com/1945459
https://bugzilla.redhat.com/1964461
https://bugzilla.redhat.com/2007557
https://bugzilla.redhat.com/2098556
https://bugzilla.redhat.com/2102001
https://bugzilla.redhat.com/2105422
https://bugzilla.redhat.com/2105426
https://bugzilla.redhat.com/2105428
https://bugzilla.redhat.com/2105430
https://bugzilla.redhat.com/show_bug.cgi?id=1907444
https://bugzilla.redhat.com/show_bug.cgi?id=1945459
https://bugzilla.redhat.com/show_bug.cgi?id=1964461
https://bugzilla.redhat.com/show_bug.cgi?id=2007557
https://bugzilla.redhat.com/show_bug.cgi?id=2098556
https://bugzilla.redhat.com/show_bug.cgi?id=2102001
https://bugzilla.redhat.com/show_bug.cgi?id=2105422
https://bugzilla.redhat.com/show_bug.cgi?id=2105426
https://bugzilla.redhat.com/show_bug.cgi?id=2105428
https://bugzilla.redhat.com/show_bug.cgi?id=2105430
https://bugzilla.redhat.com/show_bug.cgi?id=2121019
https://bugzilla.redhat.com/show_bug.cgi?id=2124299
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3807
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33987
https://errata.almalinux.org/9/ALSA-2022-6595.html
https://errata.rockylinux.org/RLSA-2022:6595
https://github.com/chalk/ansi-regex
https://github.com/chalk/ansi-regex/commit/419250fa510bf31b4cc672e76537a64f9332e1f1
https://github.com/chalk/ansi-regex/commit/75a657da7af875b2e2724fd6331bf0a4b23d3c9a
https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9
https://github.com/chalk/ansi-regex/commit/c3c0b3f2736b9c01feec0fef33980c43720dcde8
https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311
https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774
https://github.com/chalk/ansi-regex/releases/tag/v6.0.1
https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994
https://linux.oracle.com/cve/CVE-2021-3807.html
https://linux.oracle.com/errata/ELSA-2022-6595.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3807
https://security.netapp.com/advisory/ntap-20221014-0002
https://security.netapp.com/advisory/ntap-20221014-0002/
https://www.cve.org/CVERecord?id=CVE-2021-3807
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| axios |
CVE-2025-58754 |
HIGH |
1.11.0 |
1.12.0, 0.30.2 |
https://access.redhat.com/security/cve/CVE-2025-58754
https://github.com/axios/axios
https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593
https://github.com/axios/axios/commit/a1b1d3f073a988601583a604f5f9f5d05a3d0b67
https://github.com/axios/axios/commit/c30252f685e8f4326722de84923fcbc8cf557f06
https://github.com/axios/axios/pull/7011
https://github.com/axios/axios/pull/7034
https://github.com/axios/axios/releases/tag/v0.30.2
https://github.com/axios/axios/releases/tag/v1.12.0
https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj
https://nvd.nist.gov/vuln/detail/CVE-2025-58754
https://www.cve.org/CVERecord?id=CVE-2025-58754
|
| axios |
CVE-2025-58754 |
HIGH |
1.11.0 |
1.12.0, 0.30.2 |
https://access.redhat.com/security/cve/CVE-2025-58754
https://github.com/axios/axios
https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593
https://github.com/axios/axios/commit/a1b1d3f073a988601583a604f5f9f5d05a3d0b67
https://github.com/axios/axios/commit/c30252f685e8f4326722de84923fcbc8cf557f06
https://github.com/axios/axios/pull/7011
https://github.com/axios/axios/pull/7034
https://github.com/axios/axios/releases/tag/v0.30.2
https://github.com/axios/axios/releases/tag/v1.12.0
https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj
https://nvd.nist.gov/vuln/detail/CVE-2025-58754
https://www.cve.org/CVERecord?id=CVE-2025-58754
|
| axios |
CVE-2026-25639 |
HIGH |
1.11.0 |
1.13.5, 0.30.3 |
https://access.redhat.com/security/cve/CVE-2026-25639
https://github.com/axios/axios
https://github.com/axios/axios/commit/28c721588c7a77e7503d0a434e016f852c597b57
https://github.com/axios/axios/commit/d7ff1409c68168d3057fc3891f911b2b92616f9e
https://github.com/axios/axios/pull/7369
https://github.com/axios/axios/pull/7388
https://github.com/axios/axios/releases/tag/v0.30.3
https://github.com/axios/axios/releases/tag/v1.13.5
https://github.com/axios/axios/security/advisories/GHSA-43fc-jf86-j433
https://nvd.nist.gov/vuln/detail/CVE-2026-25639
https://www.cve.org/CVERecord?id=CVE-2026-25639
|
| axios |
CVE-2026-25639 |
HIGH |
1.11.0 |
1.13.5, 0.30.3 |
https://access.redhat.com/security/cve/CVE-2026-25639
https://github.com/axios/axios
https://github.com/axios/axios/commit/28c721588c7a77e7503d0a434e016f852c597b57
https://github.com/axios/axios/commit/d7ff1409c68168d3057fc3891f911b2b92616f9e
https://github.com/axios/axios/pull/7369
https://github.com/axios/axios/pull/7388
https://github.com/axios/axios/releases/tag/v0.30.3
https://github.com/axios/axios/releases/tag/v1.13.5
https://github.com/axios/axios/security/advisories/GHSA-43fc-jf86-j433
https://nvd.nist.gov/vuln/detail/CVE-2026-25639
https://www.cve.org/CVERecord?id=CVE-2026-25639
|
| brace-expansion |
CVE-2026-33750 |
MEDIUM |
1.1.12 |
5.0.5, 3.0.2, 2.0.3, 1.1.13 |
https://access.redhat.com/security/cve/CVE-2026-33750
https://github.com/juliangruber/brace-expansion
https://github.com/juliangruber/brace-expansion/blob/daa71bcb4a30a2df9bcb7f7b8daaf2ab30e5794a/src/index.ts#L107-L113
https://github.com/juliangruber/brace-expansion/blob/daa71bcb4a30a2df9bcb7f7b8daaf2ab30e5794a/src/index.ts#L184
https://github.com/juliangruber/brace-expansion/commit/311ac0d54994158c0a384e286a7d6cbb17ee8ed5
https://github.com/juliangruber/brace-expansion/commit/7fd684f89fdde3549563d0a6522226a9189472a2
https://github.com/juliangruber/brace-expansion/commit/b9cacd9e55e7a1fa588fe4b7bb1159d52f1d902a
https://github.com/juliangruber/brace-expansion/issues/98
https://github.com/juliangruber/brace-expansion/pull/95
https://github.com/juliangruber/brace-expansion/pull/96
https://github.com/juliangruber/brace-expansion/pull/97
https://github.com/juliangruber/brace-expansion/security/advisories/GHSA-f886-m6hf-6m8v
https://nvd.nist.gov/vuln/detail/CVE-2026-33750
https://www.cve.org/CVERecord?id=CVE-2026-33750
|
| brace-expansion |
CVE-2026-33750 |
MEDIUM |
5.0.3 |
5.0.5, 3.0.2, 2.0.3, 1.1.13 |
https://access.redhat.com/security/cve/CVE-2026-33750
https://github.com/juliangruber/brace-expansion
https://github.com/juliangruber/brace-expansion/blob/daa71bcb4a30a2df9bcb7f7b8daaf2ab30e5794a/src/index.ts#L107-L113
https://github.com/juliangruber/brace-expansion/blob/daa71bcb4a30a2df9bcb7f7b8daaf2ab30e5794a/src/index.ts#L184
https://github.com/juliangruber/brace-expansion/commit/311ac0d54994158c0a384e286a7d6cbb17ee8ed5
https://github.com/juliangruber/brace-expansion/commit/7fd684f89fdde3549563d0a6522226a9189472a2
https://github.com/juliangruber/brace-expansion/commit/b9cacd9e55e7a1fa588fe4b7bb1159d52f1d902a
https://github.com/juliangruber/brace-expansion/issues/98
https://github.com/juliangruber/brace-expansion/pull/95
https://github.com/juliangruber/brace-expansion/pull/96
https://github.com/juliangruber/brace-expansion/pull/97
https://github.com/juliangruber/brace-expansion/security/advisories/GHSA-f886-m6hf-6m8v
https://nvd.nist.gov/vuln/detail/CVE-2026-33750
https://www.cve.org/CVERecord?id=CVE-2026-33750
|
| brace-expansion |
CVE-2026-33750 |
MEDIUM |
5.0.4 |
5.0.5, 3.0.2, 2.0.3, 1.1.13 |
https://access.redhat.com/security/cve/CVE-2026-33750
https://github.com/juliangruber/brace-expansion
https://github.com/juliangruber/brace-expansion/blob/daa71bcb4a30a2df9bcb7f7b8daaf2ab30e5794a/src/index.ts#L107-L113
https://github.com/juliangruber/brace-expansion/blob/daa71bcb4a30a2df9bcb7f7b8daaf2ab30e5794a/src/index.ts#L184
https://github.com/juliangruber/brace-expansion/commit/311ac0d54994158c0a384e286a7d6cbb17ee8ed5
https://github.com/juliangruber/brace-expansion/commit/7fd684f89fdde3549563d0a6522226a9189472a2
https://github.com/juliangruber/brace-expansion/commit/b9cacd9e55e7a1fa588fe4b7bb1159d52f1d902a
https://github.com/juliangruber/brace-expansion/issues/98
https://github.com/juliangruber/brace-expansion/pull/95
https://github.com/juliangruber/brace-expansion/pull/96
https://github.com/juliangruber/brace-expansion/pull/97
https://github.com/juliangruber/brace-expansion/security/advisories/GHSA-f886-m6hf-6m8v
https://nvd.nist.gov/vuln/detail/CVE-2026-33750
https://www.cve.org/CVERecord?id=CVE-2026-33750
|
| braces |
CVE-2024-4068 |
HIGH |
2.3.2 |
3.0.3 |
https://access.redhat.com/security/cve/CVE-2024-4068
https://devhub.checkmarx.com/cve-details/CVE-2024-4068
https://devhub.checkmarx.com/cve-details/CVE-2024-4068/
https://github.com/micromatch/braces
https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308
https://github.com/micromatch/braces/commit/415d660c3002d1ab7e63dbf490c9851da80596ff
https://github.com/micromatch/braces/issues/35
https://github.com/micromatch/braces/pull/37
https://github.com/micromatch/braces/pull/40
https://nvd.nist.gov/vuln/detail/CVE-2024-4068
https://www.cve.org/CVERecord?id=CVE-2024-4068
|
| cookie |
CVE-2024-47764 |
LOW |
0.4.0 |
0.7.0 |
https://access.redhat.com/security/cve/CVE-2024-47764
https://github.com/jshttp/cookie
https://github.com/jshttp/cookie/commit/e10042845354fea83bd8f34af72475eed1dadf5c
https://github.com/jshttp/cookie/pull/167
https://github.com/jshttp/cookie/security/advisories/GHSA-pxg6-pf52-xh8x
https://nvd.nist.gov/vuln/detail/CVE-2024-47764
https://www.cve.org/CVERecord?id=CVE-2024-47764
|
| cookie |
CVE-2024-47764 |
LOW |
0.4.2 |
0.7.0 |
https://access.redhat.com/security/cve/CVE-2024-47764
https://github.com/jshttp/cookie
https://github.com/jshttp/cookie/commit/e10042845354fea83bd8f34af72475eed1dadf5c
https://github.com/jshttp/cookie/pull/167
https://github.com/jshttp/cookie/security/advisories/GHSA-pxg6-pf52-xh8x
https://nvd.nist.gov/vuln/detail/CVE-2024-47764
https://www.cve.org/CVERecord?id=CVE-2024-47764
|
| debug |
CVE-2017-16137 |
LOW |
3.2.6 |
2.6.9, 3.1.0, 3.2.7, 4.3.1 |
https://access.redhat.com/security/cve/CVE-2017-16137
https://github.com/debug-js/debug/commit/4e2150207c568adb9ead8f4c4528016081c88020
https://github.com/debug-js/debug/commit/71169065b5262f9858ac78cc0b688c84a438f290
https://github.com/debug-js/debug/commit/b6d12fdbc63b483e5c969da33ea6adc09946b5ac
https://github.com/debug-js/debug/commit/f53962e944a87e6ca9bb622a2a12dffc22a9bb5a
https://github.com/debug-js/debug/issues/797
https://github.com/visionmedia/debug
https://github.com/visionmedia/debug/issues/501
https://github.com/visionmedia/debug/pull/504
https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3%40%3Ccommits.netbeans.apache.org%3E
https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3E
https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63%40%3Cnotifications.netbeans.apache.org%3E
https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3E
https://nodesecurity.io/advisories/534
https://nvd.nist.gov/vuln/detail/CVE-2017-16137
https://www.cve.org/CVERecord?id=CVE-2017-16137
|
| diff |
CVE-2026-24001 |
LOW |
3.5.0 |
8.0.3, 5.2.2, 4.0.4, 3.5.1 |
https://access.redhat.com/security/cve/CVE-2026-24001
https://github.com/kpdecker/jsdiff
https://github.com/kpdecker/jsdiff/commit/15a1585230748c8ae6f8274c202e0c87309142f5
https://github.com/kpdecker/jsdiff/issues/653
https://github.com/kpdecker/jsdiff/pull/649
https://github.com/kpdecker/jsdiff/security/advisories/GHSA-73rr-hh4g-fpgx
https://nvd.nist.gov/vuln/detail/CVE-2026-24001
https://www.cve.org/CVERecord?id=CVE-2026-24001
|
| diff |
CVE-2026-24001 |
LOW |
4.0.2 |
8.0.3, 5.2.2, 4.0.4, 3.5.1 |
https://access.redhat.com/security/cve/CVE-2026-24001
https://github.com/kpdecker/jsdiff
https://github.com/kpdecker/jsdiff/commit/15a1585230748c8ae6f8274c202e0c87309142f5
https://github.com/kpdecker/jsdiff/issues/653
https://github.com/kpdecker/jsdiff/pull/649
https://github.com/kpdecker/jsdiff/security/advisories/GHSA-73rr-hh4g-fpgx
https://nvd.nist.gov/vuln/detail/CVE-2026-24001
https://www.cve.org/CVERecord?id=CVE-2026-24001
|
| engine.io |
CVE-2022-21676 |
HIGH |
5.0.0 |
4.1.2, 5.2.1, 6.1.1 |
https://github.com/socketio/engine.io
https://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874ab
https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659db
https://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098c
https://github.com/socketio/engine.io/releases/tag/4.1.2
https://github.com/socketio/engine.io/releases/tag/5.2.1
https://github.com/socketio/engine.io/releases/tag/6.1.1
https://github.com/socketio/engine.io/security/advisories/GHSA-273r-mgr4-v34f
https://nvd.nist.gov/vuln/detail/CVE-2022-21676
https://security.netapp.com/advisory/ntap-20220209-0002
https://security.netapp.com/advisory/ntap-20220209-0002/
|
| engine.io |
CVE-2022-21676 |
HIGH |
5.0.0 |
4.1.2, 5.2.1, 6.1.1 |
https://github.com/socketio/engine.io
https://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874ab
https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659db
https://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098c
https://github.com/socketio/engine.io/releases/tag/4.1.2
https://github.com/socketio/engine.io/releases/tag/5.2.1
https://github.com/socketio/engine.io/releases/tag/6.1.1
https://github.com/socketio/engine.io/security/advisories/GHSA-273r-mgr4-v34f
https://nvd.nist.gov/vuln/detail/CVE-2022-21676
https://security.netapp.com/advisory/ntap-20220209-0002
https://security.netapp.com/advisory/ntap-20220209-0002/
|
| engine.io |
CVE-2022-41940 |
MEDIUM |
5.0.0 |
3.6.1, 6.2.1 |
https://access.redhat.com/security/cve/CVE-2022-41940
https://github.com/socketio/engine.io
https://github.com/socketio/engine.io/commit/425e833ab13373edf1dd5a0706f07100db14e3c6
https://github.com/socketio/engine.io/commit/83c4071af871fc188298d7d591e95670bf9f9085
https://github.com/socketio/engine.io/security/advisories/GHSA-r7qp-cfhv-p84w
https://nvd.nist.gov/vuln/detail/CVE-2022-41940
https://www.cve.org/CVERecord?id=CVE-2022-41940
|
| engine.io |
CVE-2022-41940 |
MEDIUM |
5.0.0 |
3.6.1, 6.2.1 |
https://access.redhat.com/security/cve/CVE-2022-41940
https://github.com/socketio/engine.io
https://github.com/socketio/engine.io/commit/425e833ab13373edf1dd5a0706f07100db14e3c6
https://github.com/socketio/engine.io/commit/83c4071af871fc188298d7d591e95670bf9f9085
https://github.com/socketio/engine.io/security/advisories/GHSA-r7qp-cfhv-p84w
https://nvd.nist.gov/vuln/detail/CVE-2022-41940
https://www.cve.org/CVERecord?id=CVE-2022-41940
|
| fast-xml-parser |
CVE-2026-33036 |
HIGH |
4.5.4 |
5.5.6, 4.5.5 |
https://access.redhat.com/security/cve/CVE-2026-33036
https://github.com/NaturalIntelligence/fast-xml-parser
https://github.com/NaturalIntelligence/fast-xml-parser/commit/bd26122c838e6a55e7d7ac49b4ccc01a49999a01
https://github.com/NaturalIntelligence/fast-xml-parser/releases/tag/v4.5.5
https://github.com/NaturalIntelligence/fast-xml-parser/releases/tag/v5.5.6
https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-8gc5-j5rx-235r
https://nvd.nist.gov/vuln/detail/CVE-2026-33036
https://www.cve.org/CVERecord?id=CVE-2026-33036
|
| fast-xml-parser |
CVE-2026-33349 |
MEDIUM |
4.5.4 |
5.5.7 |
https://access.redhat.com/security/cve/CVE-2026-33349
https://github.com/NaturalIntelligence/fast-xml-parser
https://github.com/NaturalIntelligence/fast-xml-parser/commit/239b64aa1fc5c5455ddebbbb54a187eb68c9fdb7
https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-jp2q-39xq-3w4g
https://nvd.nist.gov/vuln/detail/CVE-2026-33349
https://www.cve.org/CVERecord?id=CVE-2026-33349
|
| file-type |
CVE-2026-31808 |
MEDIUM |
16.5.4 |
21.3.1 |
https://access.redhat.com/security/cve/CVE-2026-31808
https://github.com/sindresorhus/file-type
https://github.com/sindresorhus/file-type/commit/319abf871b50ba2fa221b4a7050059f1ae096f4f
https://github.com/sindresorhus/file-type/security/advisories/GHSA-5v7r-6r5c-r473
https://nvd.nist.gov/vuln/detail/CVE-2026-31808
https://www.cve.org/CVERecord?id=CVE-2026-31808
|
| got |
CVE-2022-33987 |
MEDIUM |
8.3.2 |
12.1.0, 11.8.5 |
https://access.redhat.com/errata/RHSA-2022:6595
https://access.redhat.com/security/cve/CVE-2022-33987
https://bugzilla.redhat.com/1907444
https://bugzilla.redhat.com/1945459
https://bugzilla.redhat.com/1964461
https://bugzilla.redhat.com/2007557
https://bugzilla.redhat.com/2098556
https://bugzilla.redhat.com/2102001
https://bugzilla.redhat.com/2105422
https://bugzilla.redhat.com/2105426
https://bugzilla.redhat.com/2105428
https://bugzilla.redhat.com/2105430
https://bugzilla.redhat.com/show_bug.cgi?id=1907444
https://bugzilla.redhat.com/show_bug.cgi?id=1945459
https://bugzilla.redhat.com/show_bug.cgi?id=1964461
https://bugzilla.redhat.com/show_bug.cgi?id=2007557
https://bugzilla.redhat.com/show_bug.cgi?id=2098556
https://bugzilla.redhat.com/show_bug.cgi?id=2102001
https://bugzilla.redhat.com/show_bug.cgi?id=2105422
https://bugzilla.redhat.com/show_bug.cgi?id=2105426
https://bugzilla.redhat.com/show_bug.cgi?id=2105428
https://bugzilla.redhat.com/show_bug.cgi?id=2105430
https://bugzilla.redhat.com/show_bug.cgi?id=2121019
https://bugzilla.redhat.com/show_bug.cgi?id=2124299
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3807
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33987
https://errata.almalinux.org/9/ALSA-2022-6595.html
https://errata.rockylinux.org/RLSA-2022:6595
https://github.com/sindresorhus/got
https://github.com/sindresorhus/got/commit/861ccd9ac2237df762a9e2beed7edd88c60782dc
https://github.com/sindresorhus/got/compare/v12.0.3...v12.1.0
https://github.com/sindresorhus/got/pull/2047
https://github.com/sindresorhus/got/releases/tag/v11.8.5
https://github.com/sindresorhus/got/releases/tag/v12.1.0
https://linux.oracle.com/cve/CVE-2022-33987.html
https://linux.oracle.com/errata/ELSA-2022-6595.html
https://nvd.nist.gov/vuln/detail/CVE-2022-33987
https://www.cve.org/CVERecord?id=CVE-2022-33987
|
| hosted-git-info |
CVE-2021-23362 |
MEDIUM |
2.8.8 |
2.8.9, 3.0.8 |
https://access.redhat.com/security/cve/CVE-2021-23362
https://bugzilla.redhat.com/show_bug.cgi?id=1941471
https://bugzilla.redhat.com/show_bug.cgi?id=1943208
https://bugzilla.redhat.com/show_bug.cgi?id=1979338
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290
https://errata.almalinux.org/8/ALSA-2021-3074.html
https://errata.rockylinux.org/RLSA-2021:3074
https://github.com/npm/hosted-git-info
https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7
https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01
https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3
https://github.com/npm/hosted-git-info/commits/v2
https://github.com/npm/hosted-git-info/pull/76
https://linux.oracle.com/cve/CVE-2021-23362.html
https://linux.oracle.com/errata/ELSA-2021-3074.html
https://nvd.nist.gov/vuln/detail/CVE-2021-23362
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356
https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355
https://ubuntu.com/security/notices/USN-5216-1
https://www.cve.org/CVERecord?id=CVE-2021-23362
|
| http-cache-semantics |
CVE-2022-25881 |
HIGH |
3.8.1 |
4.1.1 |
https://access.redhat.com/errata/RHSA-2023:2655
https://access.redhat.com/security/cve/CVE-2022-25881
https://bugzilla.redhat.com/2165824
https://bugzilla.redhat.com/2168631
https://bugzilla.redhat.com/2171935
https://bugzilla.redhat.com/2172190
https://bugzilla.redhat.com/2172204
https://bugzilla.redhat.com/2172217
https://bugzilla.redhat.com/show_bug.cgi?id=2165824
https://bugzilla.redhat.com/show_bug.cgi?id=2168631
https://bugzilla.redhat.com/show_bug.cgi?id=2171935
https://bugzilla.redhat.com/show_bug.cgi?id=2172190
https://bugzilla.redhat.com/show_bug.cgi?id=2172204
https://bugzilla.redhat.com/show_bug.cgi?id=2172217
https://bugzilla.redhat.com/show_bug.cgi?id=2178076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23936
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24807
https://errata.almalinux.org/9/ALSA-2023-2655.html
https://errata.rockylinux.org/RLSA-2023:2655
https://github.com/kornelski/http-cache-semantics
https://github.com/kornelski/http-cache-semantics/blob/master/index.js%23L83
https://github.com/kornelski/http-cache-semantics/commit/560b2d8ef452bbba20ffed69dc155d63ac757b74
https://linux.oracle.com/cve/CVE-2022-25881.html
https://linux.oracle.com/errata/ELSA-2023-2655.html
https://nvd.nist.gov/vuln/detail/CVE-2022-25881
https://security.netapp.com/advisory/ntap-20230622-0008
https://security.netapp.com/advisory/ntap-20230622-0008/
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253332
https://security.snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783
https://www.cve.org/CVERecord?id=CVE-2022-25881
|
| js-yaml |
CVE-2025-64718 |
MEDIUM |
3.13.1 |
4.1.1, 3.14.2 |
https://access.redhat.com/security/cve/CVE-2025-64718
https://github.com/advisories/GHSA-mh29-5h37-fv8m
https://github.com/nodeca/js-yaml
https://github.com/nodeca/js-yaml/commit/383665ff4248ec2192d1274e934462bb30426879
https://github.com/nodeca/js-yaml/commit/5278870a17454fe8621dbd8c445c412529525266
https://github.com/nodeca/js-yaml/issues/730#issuecomment-3549635876
https://github.com/nodeca/js-yaml/security/advisories/GHSA-mh29-5h37-fv8m
https://nvd.nist.gov/vuln/detail/CVE-2025-64718
https://www.cve.org/CVERecord?id=CVE-2025-64718
|
| js-yaml |
CVE-2025-64718 |
MEDIUM |
3.14.1 |
4.1.1, 3.14.2 |
https://access.redhat.com/security/cve/CVE-2025-64718
https://github.com/advisories/GHSA-mh29-5h37-fv8m
https://github.com/nodeca/js-yaml
https://github.com/nodeca/js-yaml/commit/383665ff4248ec2192d1274e934462bb30426879
https://github.com/nodeca/js-yaml/commit/5278870a17454fe8621dbd8c445c412529525266
https://github.com/nodeca/js-yaml/issues/730#issuecomment-3549635876
https://github.com/nodeca/js-yaml/security/advisories/GHSA-mh29-5h37-fv8m
https://nvd.nist.gov/vuln/detail/CVE-2025-64718
https://www.cve.org/CVERecord?id=CVE-2025-64718
|
| micromatch |
CVE-2024-4067 |
MEDIUM |
3.1.10 |
4.0.8 |
https://access.redhat.com/security/cve/CVE-2024-4067
https://advisory.checkmarx.net/advisory/CVE-2024-4067
https://advisory.checkmarx.net/advisory/CVE-2024-4067/
https://devhub.checkmarx.com/cve-details/CVE-2024-4067
https://devhub.checkmarx.com/cve-details/CVE-2024-4067/
https://github.com/micromatch/micromatch
https://github.com/micromatch/micromatch/blob/2c56a8604b68c1099e7bc0f807ce0865a339747a/index.js#L448
https://github.com/micromatch/micromatch/commit/03aa8052171e878897eee5d7bb2ae0ae83ec2ade
https://github.com/micromatch/micromatch/commit/500d5d6f42f0e8dfa1cb5464c6cb420b1b6aaaa0
https://github.com/micromatch/micromatch/issues/243
https://github.com/micromatch/micromatch/pull/247
https://github.com/micromatch/micromatch/pull/266
https://github.com/micromatch/micromatch/releases/tag/4.0.8
https://nvd.nist.gov/vuln/detail/CVE-2024-4067
https://www.cve.org/CVERecord?id=CVE-2024-4067
|
| min-document |
CVE-2025-57352 |
LOW |
2.19.0 |
2.19.1 |
https://access.redhat.com/security/cve/CVE-2025-57352
https://github.com/Raynos/min-document
https://github.com/Raynos/min-document/commit/fe32e8da464cef622528725f647029a8fd7d95a6
https://github.com/Raynos/min-document/issues/54
https://github.com/Raynos/min-document/pull/55
https://github.com/VulnSageAgent/PoCs/tree/main/JavaScript/prototype-pollution/CVE-2025-57352
https://nvd.nist.gov/vuln/detail/CVE-2025-57352
https://www.cve.org/CVERecord?id=CVE-2025-57352
|
| minimatch |
CVE-2026-27903 |
HIGH |
10.2.2 |
10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.3 |
https://access.redhat.com/security/cve/CVE-2026-27903
https://github.com/isaacs/minimatch
https://github.com/isaacs/minimatch/commit/0bf499aa45f5059b56809cc3b75ff3eafeb8d748
https://github.com/isaacs/minimatch/security/advisories/GHSA-7r86-cg39-jmmj
https://nvd.nist.gov/vuln/detail/CVE-2026-27903
https://www.cve.org/CVERecord?id=CVE-2026-27903
|
| minimatch |
CVE-2026-27904 |
HIGH |
10.2.2 |
10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.4 |
https://access.redhat.com/security/cve/CVE-2026-27904
https://github.com/isaacs/minimatch
https://github.com/isaacs/minimatch/commit/11d0df6165d15a955462316b26d52e5efae06fce
https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74
https://nvd.nist.gov/vuln/detail/CVE-2026-27904
https://www.cve.org/CVERecord?id=CVE-2026-27904
|
| minimatch |
CVE-2026-27904 |
HIGH |
3.1.3 |
10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, 3.1.4 |
https://access.redhat.com/security/cve/CVE-2026-27904
https://github.com/isaacs/minimatch
https://github.com/isaacs/minimatch/commit/11d0df6165d15a955462316b26d52e5efae06fce
https://github.com/isaacs/minimatch/security/advisories/GHSA-23c5-xmqv-rm74
https://nvd.nist.gov/vuln/detail/CVE-2026-27904
https://www.cve.org/CVERecord?id=CVE-2026-27904
|
| node-forge |
CVE-2026-33891 |
HIGH |
1.3.2 |
1.4.0 |
https://access.redhat.com/security/cve/CVE-2026-33891
https://github.com/digitalbazaar/forge
https://github.com/digitalbazaar/forge/commit/9bb8d67b99d17e4ebb5fd7596cd699e11f25d023
https://github.com/digitalbazaar/forge/security/advisories/GHSA-5m6q-g25r-mvwx
https://nvd.nist.gov/vuln/detail/CVE-2026-33891
https://www.cve.org/CVERecord?id=CVE-2026-33891
|
| node-forge |
CVE-2026-33894 |
HIGH |
1.3.2 |
1.4.0 |
https://access.redhat.com/security/cve/CVE-2026-33894
https://datatracker.ietf.org/doc/html/rfc2313#section-8
https://github.com/digitalbazaar/forge
https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765
https://github.com/digitalbazaar/forge/security/advisories/GHSA-ppp5-5v6c-4jwp
https://mailarchive.ietf.org/arch/msg/openpgp/5rnE9ZRN1AokBVj3VqblGlP63QE
https://nvd.nist.gov/vuln/detail/CVE-2026-33894
https://www.cve.org/CVERecord?id=CVE-2026-33894
https://www.rfc-editor.org/rfc/rfc8017.html
|
| node-forge |
CVE-2026-33895 |
HIGH |
1.3.2 |
1.4.0 |
https://access.redhat.com/security/cve/CVE-2026-33895
https://datatracker.ietf.org/doc/html/rfc8032#section-8.4
https://github.com/digitalbazaar/forge
https://github.com/digitalbazaar/forge/commit/bdecf11571c9f1a487cc0fe72fe78ff6dfa96b85
https://github.com/digitalbazaar/forge/security/advisories/GHSA-q67f-28xg-22rw
https://nvd.nist.gov/vuln/detail/CVE-2022-35961
https://nvd.nist.gov/vuln/detail/CVE-2026-25793
https://nvd.nist.gov/vuln/detail/CVE-2026-33895
https://www.cve.org/CVERecord?id=CVE-2026-33895
|
| node-forge |
CVE-2026-33896 |
HIGH |
1.3.2 |
1.4.0 |
https://access.redhat.com/security/cve/CVE-2026-33896
https://github.com/digitalbazaar/forge
https://github.com/digitalbazaar/forge/commit/2e492832fb25227e6b647cbe1ac981c123171e90
https://github.com/digitalbazaar/forge/security/advisories/GHSA-2328-f5f3-gj25
https://nvd.nist.gov/vuln/detail/CVE-2026-33896
https://www.cve.org/CVERecord?id=CVE-2026-33896
|
| on-headers |
CVE-2025-7339 |
LOW |
1.0.2 |
1.1.0 |
https://access.redhat.com/security/cve/CVE-2025-7339
https://cna.openjsf.org/security-advisories.html
https://github.com/expressjs/morgan/issues/315
https://github.com/jshttp/on-headers
https://github.com/jshttp/on-headers/commit/c6e384908c9c6127d18831d16ab0bd96e1231867
https://github.com/jshttp/on-headers/issues/15
https://github.com/jshttp/on-headers/security/advisories/GHSA-76c9-3jph-rj3q
https://nvd.nist.gov/vuln/detail/CVE-2025-7339
https://www.cve.org/CVERecord?id=CVE-2025-7339
|
| parseuri |
CVE-2024-36751 |
MEDIUM |
0.0.6 |
2.0.0 |
https://gist.github.com/6en6ar/78168687da94e8aa2e0357f2456b0233
https://github.com/Kikobeats/parse-uri/issues/14
https://nvd.nist.gov/vuln/detail/CVE-2024-36751
|
| path-to-regexp |
CVE-2026-4867 |
HIGH |
0.1.12 |
0.1.13 |
https://access.redhat.com/security/cve/CVE-2026-4867
https://blakeembrey.com/posts/2024-09-web-redos
https://cna.openjsf.org/security-advisories.html
https://github.com/advisories/GHSA-9wv6-86v2-598j
https://github.com/pillarjs/path-to-regexp
https://github.com/pillarjs/path-to-regexp/releases/tag/v.0.1.13
https://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-37ch-88jc-xwx2
https://nvd.nist.gov/vuln/detail/CVE-2026-4867
https://www.cve.org/CVERecord?id=CVE-2026-4867
|
| phin |
GHSA-x565-32qp-m3vf |
MEDIUM |
2.9.3 |
3.7.1 |
https://github.com/ethanent/phin
https://github.com/ethanent/phin/commit/c071f95336a987dad9332fd388adeb249925cc57
https://github.com/ethanent/phin/security/advisories/GHSA-x565-32qp-m3vf
|
| picomatch |
CVE-2026-33671 |
HIGH |
2.3.1 |
4.0.4, 3.0.2, 2.3.2 |
https://access.redhat.com/security/cve/CVE-2026-33671
https://github.com/micromatch/picomatch
https://github.com/micromatch/picomatch/commit/5eceecd27543b8e056b9307d69e105ea03618a7d
https://github.com/micromatch/picomatch/security/advisories/GHSA-c2c7-rcm5-vvqj
https://nvd.nist.gov/vuln/detail/CVE-2026-33671
https://www.cve.org/CVERecord?id=CVE-2026-33671
|
| picomatch |
CVE-2026-33672 |
MEDIUM |
2.3.1 |
4.0.4, 3.0.2, 2.3.2 |
https://access.redhat.com/security/cve/CVE-2026-33672
https://github.com/micromatch/picomatch
https://github.com/micromatch/picomatch/commit/4516eb521f13a46b2fe1a1d2c9ef6b20ddc0e903
https://github.com/micromatch/picomatch/security/advisories/GHSA-3v7f-55p6-f55p
https://nvd.nist.gov/vuln/detail/CVE-2026-33672
https://www.cve.org/CVERecord?id=CVE-2026-33672
|
| picomatch |
CVE-2026-33671 |
HIGH |
4.0.3 |
4.0.4, 3.0.2, 2.3.2 |
https://access.redhat.com/security/cve/CVE-2026-33671
https://github.com/micromatch/picomatch
https://github.com/micromatch/picomatch/commit/5eceecd27543b8e056b9307d69e105ea03618a7d
https://github.com/micromatch/picomatch/security/advisories/GHSA-c2c7-rcm5-vvqj
https://nvd.nist.gov/vuln/detail/CVE-2026-33671
https://www.cve.org/CVERecord?id=CVE-2026-33671
|
| picomatch |
CVE-2026-33672 |
MEDIUM |
4.0.3 |
4.0.4, 3.0.2, 2.3.2 |
https://access.redhat.com/security/cve/CVE-2026-33672
https://github.com/micromatch/picomatch
https://github.com/micromatch/picomatch/commit/4516eb521f13a46b2fe1a1d2c9ef6b20ddc0e903
https://github.com/micromatch/picomatch/security/advisories/GHSA-3v7f-55p6-f55p
https://nvd.nist.gov/vuln/detail/CVE-2026-33672
https://www.cve.org/CVERecord?id=CVE-2026-33672
|
| serialize-javascript |
CVE-2026-34043 |
MEDIUM |
7.0.3 |
7.0.5 |
https://github.com/yahoo/serialize-javascript
https://github.com/yahoo/serialize-javascript/commit/f147e90269b58bb6e539cfdf3d0e20d6ad14204b
https://github.com/yahoo/serialize-javascript/releases/tag/v7.0.5
https://github.com/yahoo/serialize-javascript/security/advisories/GHSA-qj8w-gfj5-8c6v
https://nvd.nist.gov/vuln/detail/CVE-2026-34043
|
| socket.io-parser |
CVE-2026-33151 |
HIGH |
4.0.5 |
3.3.5, 3.4.4, 4.2.6 |
https://access.redhat.com/security/cve/CVE-2026-33151
https://github.com/socketio/socket.io
https://github.com/socketio/socket.io/commit/719f9ebab0772ffb882bd614b387e585c1aa75d4
https://github.com/socketio/socket.io/commit/9d39f1f080510f036782f2177fac701cc041faaf
https://github.com/socketio/socket.io/commit/b25738c416c4e32fbff62ee182afa8f6d0dacf78
https://github.com/socketio/socket.io/security/advisories/GHSA-677m-j7p3-52f9
https://nvd.nist.gov/vuln/detail/CVE-2026-33151
https://www.cve.org/CVERecord?id=CVE-2026-33151
|
| socket.io-parser |
CVE-2026-33151 |
HIGH |
4.0.5 |
3.3.5, 3.4.4, 4.2.6 |
https://access.redhat.com/security/cve/CVE-2026-33151
https://github.com/socketio/socket.io
https://github.com/socketio/socket.io/commit/719f9ebab0772ffb882bd614b387e585c1aa75d4
https://github.com/socketio/socket.io/commit/9d39f1f080510f036782f2177fac701cc041faaf
https://github.com/socketio/socket.io/commit/b25738c416c4e32fbff62ee182afa8f6d0dacf78
https://github.com/socketio/socket.io/security/advisories/GHSA-677m-j7p3-52f9
https://nvd.nist.gov/vuln/detail/CVE-2026-33151
https://www.cve.org/CVERecord?id=CVE-2026-33151
|
| socket.io-parser |
CVE-2026-33151 |
HIGH |
4.0.5 |
3.3.5, 3.4.4, 4.2.6 |
https://access.redhat.com/security/cve/CVE-2026-33151
https://github.com/socketio/socket.io
https://github.com/socketio/socket.io/commit/719f9ebab0772ffb882bd614b387e585c1aa75d4
https://github.com/socketio/socket.io/commit/9d39f1f080510f036782f2177fac701cc041faaf
https://github.com/socketio/socket.io/commit/b25738c416c4e32fbff62ee182afa8f6d0dacf78
https://github.com/socketio/socket.io/security/advisories/GHSA-677m-j7p3-52f9
https://nvd.nist.gov/vuln/detail/CVE-2026-33151
https://www.cve.org/CVERecord?id=CVE-2026-33151
|
| socket.io-parser |
CVE-2023-32695 |
MEDIUM |
4.0.5 |
4.2.3, 3.4.3, 3.3.4 |
https://github.com/socketio/socket.io-parser
https://github.com/socketio/socket.io-parser/commit/1c220ddbf45ea4b44bc8dbf6f9ae245f672ba1b9
https://github.com/socketio/socket.io-parser/commit/2dc3c92622dad113b8676be06f23b1ed46b02ced
https://github.com/socketio/socket.io-parser/commit/3b78117bf6ba7e99d7a5cfc1ba54d0477554a7f3
https://github.com/socketio/socket.io-parser/commit/ee006607495eca4ec7262ad080dd3a91439a5ba4
https://github.com/socketio/socket.io-parser/releases/tag/4.2.3
https://github.com/socketio/socket.io-parser/security/advisories/GHSA-cqmj-92xf-r6r9
https://nvd.nist.gov/vuln/detail/CVE-2023-32695
|
| socket.io-parser |
CVE-2023-32695 |
MEDIUM |
4.0.5 |
4.2.3, 3.4.3, 3.3.4 |
https://github.com/socketio/socket.io-parser
https://github.com/socketio/socket.io-parser/commit/1c220ddbf45ea4b44bc8dbf6f9ae245f672ba1b9
https://github.com/socketio/socket.io-parser/commit/2dc3c92622dad113b8676be06f23b1ed46b02ced
https://github.com/socketio/socket.io-parser/commit/3b78117bf6ba7e99d7a5cfc1ba54d0477554a7f3
https://github.com/socketio/socket.io-parser/commit/ee006607495eca4ec7262ad080dd3a91439a5ba4
https://github.com/socketio/socket.io-parser/releases/tag/4.2.3
https://github.com/socketio/socket.io-parser/security/advisories/GHSA-cqmj-92xf-r6r9
https://nvd.nist.gov/vuln/detail/CVE-2023-32695
|
| 27 other vulnerabilities found... |
| No Misconfigurations found |