@openrewrite/recipes-nodejs 0.36.0-20251214-170412 → 0.36.0-20251215-110739

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -3625,17 +3625,21 @@ CVE-2025-11953,2025-11-03T18:31:52Z,"@react-native-community/cli has arbitrary O
3625
3625
  CVE-2025-11953,2025-11-03T18:31:52Z,"@react-native-community/cli has arbitrary OS command injection","@react-native-community/cli-server-api",20.0.0-alpha.0,20.0.0,,CRITICAL,CWE-78
3626
3626
  CVE-2025-12613,2025-11-10T06:30:26Z,"Cloudinary Node SDK is vulnerable to Arbitrary Argument Injection through parameters that include an ampersand",cloudinary,0,2.7.0,,HIGH,CWE-88
3627
3627
  CVE-2025-12735,2025-11-05T03:30:23Z,"expr-eval does not restrict functions passed to the evaluate function",expr-eval,0,,2.0.2,HIGH,CWE-94
3628
- CVE-2025-12735,2025-11-05T03:30:23Z,"expr-eval does not restrict functions passed to the evaluate function",expr-eval-fork,0,,3.0.0,HIGH,CWE-94
3628
+ CVE-2025-12735,2025-11-05T03:30:23Z,"expr-eval does not restrict functions passed to the evaluate function",expr-eval-fork,0,3.0.1,,HIGH,CWE-94
3629
3629
  CVE-2025-12758,2025-11-27T06:31:25Z,"Validator is Vulnerable to Incomplete Filtering of One or More Instances of Special Elements",validator,0,13.15.22,,HIGH,CWE-792
3630
3630
  CVE-2025-12816,2025-11-26T22:07:19Z,"node-forge has an Interpretation Conflict vulnerability via its ASN.1 Validator Desynchronization",node-forge,0,1.3.2,,HIGH,CWE-436
3631
- CVE-2025-12919,2025-11-09T21:30:16Z,"EverShop is vulnerable to Unauthorized Order Information Access (IDOR)",@evershop/evershop,0,,2.1.0,LOW,CWE-99
3631
+ CVE-2025-12919,2025-11-09T21:30:16Z,"EverShop is vulnerable to Unauthorized Order Information Access (IDOR)",@evershop/evershop,0,,2.1.0,LOW,CWE-639;CWE-99
3632
3632
  CVE-2025-1302,2025-02-15T06:30:51Z,"JSONPath Plus allows Remote Code Execution",jsonpath-plus,0,10.3.0,,HIGH,CWE-94
3633
3633
  CVE-2025-13033,2025-10-07T13:42:02Z,"Nodemailer: Email to an unintended domain can occur due to Interpretation Conflict",nodemailer,0,7.0.7,,MODERATE,CWE-20;CWE-436
3634
3634
  CVE-2025-13204,2025-11-14T18:31:39Z,"expr-eval vulnerable to Prototype Pollution",expr-eval,0,,2.0.2,HIGH,CWE-1321
3635
3635
  CVE-2025-13204,2025-11-14T18:31:39Z,"expr-eval vulnerable to Prototype Pollution",expr-eval-fork,0,2.0.2,,HIGH,CWE-1321
3636
3636
  CVE-2025-13437,2025-11-20T18:31:01Z,"zx Uses Incorrectly-Resolved Name or Reference",zx,0,8.8.5,,MODERATE,CWE-706
3637
3637
  CVE-2025-13466,2025-11-25T14:20:21Z,"body-parser is vulnerable to denial of service when url encoding is used",body-parser,2.2.0,2.2.1,,MODERATE,CWE-400
3638
+ CVE-2025-13877,2025-12-09T17:42:53Z,"Authentication Bypass via Default JWT Secret in NocoBase docker-compose Deployments",@nocobase/auth,0,1.9.0-beta.18,,MODERATE,CWE-1320;CWE-321
3639
+ CVE-2025-13877,2025-12-09T17:42:53Z,"Authentication Bypass via Default JWT Secret in NocoBase docker-compose Deployments",@nocobase/auth,1.9.0,1.9.23,,MODERATE,CWE-1320;CWE-321
3640
+ CVE-2025-13877,2025-12-09T17:42:53Z,"Authentication Bypass via Default JWT Secret in NocoBase docker-compose Deployments",@nocobase/auth,2.0.0-alpha.1,2.0.0-alpha.52,,MODERATE,CWE-1320;CWE-321
3638
3641
  CVE-2025-1398,2025-03-17T15:31:50Z,"Mattermost Desktop App allows the bypass of Transparency, Consent, and Control (TCC) via code injection",mattermost-desktop,0,5.11.0,,LOW,CWE-426
3642
+ CVE-2025-14284,2025-12-09T18:30:35Z,"@tiptap/extension-link vulnerable to Cross-site Scripting (XSS)",@tiptap/extension-link,0,2.10.4,,LOW,CWE-79
3639
3643
  CVE-2025-1467,2025-02-23T18:30:24Z,"tarteaucitron Cross-site Scripting (XSS)",tarteaucitronjs,0,1.17.0,,LOW,CWE-79
3640
3644
  CVE-2025-1520,2025-04-23T18:30:58Z,"PostHog Plugin Server SQL Injection Vulnerability",@posthog/plugin-server,0,,1.10.7,HIGH,CWE-89
3641
3645
  CVE-2025-1691,2025-02-27T15:31:51Z,"MongoDB Shell may be susceptible to Control Character Injection via autocomplete",mongosh,0,2.3.9,,HIGH,CWE-74
@@ -4031,9 +4035,27 @@ CVE-2025-55182,2025-12-03T19:07:39Z,"React Server Components are Vulnerable to R
4031
4035
  CVE-2025-55182,2025-12-03T19:07:39Z,"React Server Components are Vulnerable to RCE",react-server-dom-parcel,19.0.0,19.0.1,,CRITICAL,CWE-502
4032
4036
  CVE-2025-55182,2025-12-03T19:07:39Z,"React Server Components are Vulnerable to RCE",react-server-dom-parcel,19.1.0,19.1.2,,CRITICAL,CWE-502
4033
4037
  CVE-2025-55182,2025-12-03T19:07:39Z,"React Server Components are Vulnerable to RCE",react-server-dom-parcel,19.2.0,19.2.1,,CRITICAL,CWE-502
4034
- CVE-2025-55182,2025-12-03T19:07:39Z,"React Server Components are Vulnerable to RCE",react-server-dom-webpack,19.0,19.0.1,,CRITICAL,CWE-502
4038
+ CVE-2025-55182,2025-12-03T19:07:39Z,"React Server Components are Vulnerable to RCE",react-server-dom-webpack,19.0.0,19.0.1,,CRITICAL,CWE-502
4035
4039
  CVE-2025-55182,2025-12-03T19:07:39Z,"React Server Components are Vulnerable to RCE",react-server-dom-webpack,19.1.0,19.1.2,,CRITICAL,CWE-502
4036
4040
  CVE-2025-55182,2025-12-03T19:07:39Z,"React Server Components are Vulnerable to RCE",react-server-dom-webpack,19.2.0,19.2.1,,CRITICAL,CWE-502
4041
+ CVE-2025-55183,2025-12-11T22:36:08Z,"Source Code Exposure Vulnerability in React Server Components","react-server-dom-turbopack",19.0.0,19.0.2,,MODERATE,CWE-497;CWE-502
4042
+ CVE-2025-55183,2025-12-11T22:36:08Z,"Source Code Exposure Vulnerability in React Server Components","react-server-dom-turbopack",19.1.0,19.1.3,,MODERATE,CWE-497;CWE-502
4043
+ CVE-2025-55183,2025-12-11T22:36:08Z,"Source Code Exposure Vulnerability in React Server Components","react-server-dom-turbopack",19.2.0,19.2.2,,MODERATE,CWE-497;CWE-502
4044
+ CVE-2025-55183,2025-12-11T22:36:08Z,"Source Code Exposure Vulnerability in React Server Components",react-server-dom-parcel,19.0.0,19.0.2,,MODERATE,CWE-497;CWE-502
4045
+ CVE-2025-55183,2025-12-11T22:36:08Z,"Source Code Exposure Vulnerability in React Server Components",react-server-dom-parcel,19.1.0,19.1.3,,MODERATE,CWE-497;CWE-502
4046
+ CVE-2025-55183,2025-12-11T22:36:08Z,"Source Code Exposure Vulnerability in React Server Components",react-server-dom-parcel,19.2.0,19.2.2,,MODERATE,CWE-497;CWE-502
4047
+ CVE-2025-55183,2025-12-11T22:36:08Z,"Source Code Exposure Vulnerability in React Server Components",react-server-dom-webpack,19.0.0,19.0.2,,MODERATE,CWE-497;CWE-502
4048
+ CVE-2025-55183,2025-12-11T22:36:08Z,"Source Code Exposure Vulnerability in React Server Components",react-server-dom-webpack,19.1.0,19.1.3,,MODERATE,CWE-497;CWE-502
4049
+ CVE-2025-55183,2025-12-11T22:36:08Z,"Source Code Exposure Vulnerability in React Server Components",react-server-dom-webpack,19.2.0,19.2.2,,MODERATE,CWE-497;CWE-502
4050
+ CVE-2025-55184,2025-12-11T22:36:44Z,"Denial of Service Vulnerability in React Server Components","react-server-dom-turbopack",19.0.0,19.0.2,,HIGH,CWE-400;CWE-502
4051
+ CVE-2025-55184,2025-12-11T22:36:44Z,"Denial of Service Vulnerability in React Server Components","react-server-dom-turbopack",19.1.0,19.1.3,,HIGH,CWE-400;CWE-502
4052
+ CVE-2025-55184,2025-12-11T22:36:44Z,"Denial of Service Vulnerability in React Server Components","react-server-dom-turbopack",19.2.0,19.2.2,,HIGH,CWE-400;CWE-502
4053
+ CVE-2025-55184,2025-12-11T22:36:44Z,"Denial of Service Vulnerability in React Server Components",react-server-dom-parcel,19.0.0,19.0.2,,HIGH,CWE-400;CWE-502
4054
+ CVE-2025-55184,2025-12-11T22:36:44Z,"Denial of Service Vulnerability in React Server Components",react-server-dom-parcel,19.1.0,19.1.3,,HIGH,CWE-400;CWE-502
4055
+ CVE-2025-55184,2025-12-11T22:36:44Z,"Denial of Service Vulnerability in React Server Components",react-server-dom-parcel,19.2.0,19.2.2,,HIGH,CWE-400;CWE-502
4056
+ CVE-2025-55184,2025-12-11T22:36:44Z,"Denial of Service Vulnerability in React Server Components",react-server-dom-webpack,19.0.0,19.0.2,,HIGH,CWE-400;CWE-502
4057
+ CVE-2025-55184,2025-12-11T22:36:44Z,"Denial of Service Vulnerability in React Server Components",react-server-dom-webpack,19.1.0,19.1.3,,HIGH,CWE-400;CWE-502
4058
+ CVE-2025-55184,2025-12-11T22:36:44Z,"Denial of Service Vulnerability in React Server Components",react-server-dom-webpack,19.2.0,19.2.2,,HIGH,CWE-400;CWE-502
4037
4059
  CVE-2025-55207,2025-08-15T16:52:48Z,"@astrojs/node's trailing slash handling causes open redirect issue",@astrojs/node,0,9.4.1,,MODERATE,CWE-601
4038
4060
  CVE-2025-55284,2025-08-18T18:46:52Z,"Claude Code's Permissive Default Allowlist Enables Unauthorized File Read and Network Exfiltration in Claude Code","@anthropic-ai/claude-code",0,1.0.4,,HIGH,CWE-78
4039
4061
  CVE-2025-55285,2025-08-15T18:43:16Z,"Template Secret leakage in logs in Scaffolder when using `fetch:template`","@backstage/plugin-scaffolder-backend",0,2.1.1,,LOW,CWE-532
@@ -4052,7 +4074,7 @@ CVE-2025-56200,2025-09-30T18:30:25Z,"validator.js has a URL validation bypass vu
4052
4074
  CVE-2025-56265,2025-09-08T18:31:42Z,"N8N's Chat Trigger component is vulnerable to XSS",@n8n/n8n-nodes-langchain,0,1.107.0,,HIGH,CWE-434;CWE-79
4053
4075
  CVE-2025-56571,2025-09-30T18:30:24Z,"Finance.js vulnerable to DoS via the IRR function’s depth parameter",financejs,0,,4.1.0,HIGH,CWE-400;CWE-770;CWE-834
4054
4076
  CVE-2025-56572,2025-09-30T18:30:24Z,"Finance.js vulnerable to DoS via the seekZero() parameter",financejs,0,,4.1.0,HIGH,CWE-400;CWE-770
4055
- CVE-2025-56648,2025-09-17T21:30:42Z,"Parcel has an Origin Validation Error vulnerability","@parcel/reporter-dev-server",1.6.1,,2.16.0,MODERATE,CWE-346
4077
+ CVE-2025-56648,2025-09-17T21:30:42Z,"Parcel has an Origin Validation Error vulnerability","@parcel/reporter-dev-server",1.6.1,,2.16.3,MODERATE,CWE-346
4056
4078
  CVE-2025-57164,2025-09-15T19:51:08Z,"FlowiseAI Pre-Auth Arbitrary Code Execution",flowise,3.0.5,3.0.6,,CRITICAL,CWE-94
4057
4079
  CVE-2025-57285,2025-09-08T18:31:42Z,"CodeceptJS's incomprehensive sanitation can lead to Command Injection",codeceptjs,3.5.0,3.7.5,,CRITICAL,CWE-77
4058
4080
  CVE-2025-57317,2025-09-25T15:30:24Z,"apidoc-core is vulnerable to prototype pollution",apidoc-core,0,,0.15.0,HIGH,CWE-400
@@ -4202,7 +4224,7 @@ CVE-2025-61913,2025-10-09T15:21:39Z,"Flowise is vulnerable to arbitrary file wri
4202
4224
  CVE-2025-61913,2025-10-09T15:21:39Z,"Flowise is vulnerable to arbitrary file write through its WriteFileTool ",flowise-components,0,3.0.8,,CRITICAL,CWE-22
4203
4225
  CVE-2025-61925,2025-10-10T23:41:29Z,"Astro's `X-Forwarded-Host` is reflected without validation",astro,0,5.14.3,,MODERATE,CWE-20;CWE-470
4204
4226
  CVE-2025-61927,2025-10-10T23:46:42Z,"Happy DOM: VM Context Escape can lead to Remote Code Execution",happy-dom,0,20.0.0,,CRITICAL,CWE-94
4205
- CVE-2025-61928,2025-10-09T15:40:50Z,"Better Auth: Unauthenticated API key creation through api-key plugin",better-auth,0,1.3.26,,CRITICAL,CWE-285;CWE-306
4227
+ CVE-2025-61928,2025-10-09T15:40:50Z,"Better Auth: Unauthenticated API key creation through api-key plugin",better-auth,0,1.3.26,,HIGH,CWE-285;CWE-306
4206
4228
  CVE-2025-62366,2025-10-14T19:49:56Z,"Mailgen has HTML Injection and XSS Filter Bypass in Plaintext Emails",mailgen,0,2.0.31,,LOW,CWE-79
4207
4229
  CVE-2025-62374,2025-10-14T22:24:10Z,"Parse Javascript SDK vulnerable to prototype pollution in `Parse.Object` and internal APIs",parse,0,7.0.0,,MODERATE,CWE-1321
4208
4230
  CVE-2025-62378,2025-10-13T17:43:51Z,"CommandKit has incorrect command name exposure in context object for message command aliases",commandkit,1.2.0-rc.1,1.2.0-rc.12,,MODERATE,CWE-706
@@ -4263,6 +4285,8 @@ CVE-2025-65108,2025-11-20T17:48:11Z,"md-to-pdf vulnerable to arbitrary JavaScrip
4263
4285
  CVE-2025-6514,2025-07-09T15:30:44Z,"mcp-remote exposed to OS command injection via untrusted MCP server connections",mcp-remote,0.0.5,0.1.16,,CRITICAL,CWE-78
4264
4286
  CVE-2025-6545,2025-06-23T22:41:50Z,"pbkdf2 returns predictable uninitialized/zero-filled memory for non-normalized or unimplemented algos",pbkdf2,3.0.10,3.1.3,,CRITICAL,CWE-20
4265
4287
  CVE-2025-6547,2025-06-23T22:42:00Z,"pbkdf2 silently disregards Uint8Array input, returning static keys",pbkdf2,0,3.1.3,,CRITICAL,CWE-20
4288
+ CVE-2025-65513,2025-12-10T00:30:22Z,"Fetch MCP Server has a Server-Side Request Forgery (SSRF) vulnerability",mcp-fetch-server,0,,1.0.2,MODERATE,CWE-918
4289
+ CVE-2025-65849,2025-12-08T21:30:22Z,"Altcha Proof-of-Work obfuscation mode cryptanalytic break",altcha,0.8.0,,2.2.4,MODERATE,CWE-327
4266
4290
  CVE-2025-65944,2025-11-24T21:52:45Z,"Sentry's sensitive headers are leaked when `sendDefaultPii` is set to `true`","@sentry/google-cloud-serverless",10.11.0,10.27.0,,MODERATE,CWE-201
4267
4291
  CVE-2025-65944,2025-11-24T21:52:45Z,"Sentry's sensitive headers are leaked when `sendDefaultPii` is set to `true`",@sentry/astro,10.11.0,10.27.0,,MODERATE,CWE-201
4268
4292
  CVE-2025-65944,2025-11-24T21:52:45Z,"Sentry's sensitive headers are leaked when `sendDefaultPii` is set to `true`",@sentry/aws-serverless,10.11.0,10.27.0,,MODERATE,CWE-201
@@ -4278,6 +4302,7 @@ CVE-2025-65944,2025-11-24T21:52:45Z,"Sentry's sensitive headers are leaked when
4278
4302
  CVE-2025-65945,2025-12-04T16:54:15Z,"auth0/node-jws Improperly Verifies HMAC Signature",jws,0,3.2.3,,HIGH,CWE-347
4279
4303
  CVE-2025-65945,2025-12-04T16:54:15Z,"auth0/node-jws Improperly Verifies HMAC Signature",jws,4.0.0,4.0.1,,HIGH,CWE-347
4280
4304
  CVE-2025-65959,2025-12-04T22:03:24Z,"Open WebUI Vulnerable to Stored DOM XSS via Note 'Download PDF'",open-webui,0,0.6.37,,HIGH,CWE-116;CWE-79
4305
+ CVE-2025-65964,2025-12-08T21:30:07Z,"n8n vulnerable to Remote Code Execution via Git Node Custom Pre-Commit Hook",n8n,0.123.1,1.119.2,,CRITICAL,CWE-829
4281
4306
  CVE-2025-65966,2025-11-26T19:33:08Z,"OneUptime Unauthorized User Creation via API",@oneuptime/common,0,9.1.0,,HIGH,CWE-285
4282
4307
  CVE-2025-66020,2025-11-26T19:33:34Z,"Valibot has a ReDoS vulnerability in `EMOJI_REGEX`",valibot,0.31.0,1.2.0,,HIGH,CWE-1333
4283
4308
  CVE-2025-66028,2025-11-25T22:55:50Z,"OneUptime is Vulnerable to Privilege Escalation via Login Response Manipulation ",@oneuptime/common,0,8.0.5567,,MODERATE,CWE-284;CWE-863
@@ -4287,6 +4312,7 @@ CVE-2025-66032,2025-12-03T16:27:19Z,"Claude Code Command Validation Bypass Allow
4287
4312
  CVE-2025-66035,2025-11-26T23:18:50Z,"Angular is Vulnerable to XSRF Token Leakage via Protocol-Relative URLs in Angular HTTP Client",@angular/common,0,19.2.16,,HIGH,CWE-201;CWE-359
4288
4313
  CVE-2025-66035,2025-11-26T23:18:50Z,"Angular is Vulnerable to XSRF Token Leakage via Protocol-Relative URLs in Angular HTTP Client",@angular/common,20.0.0-next.0,20.3.14,,HIGH,CWE-201;CWE-359
4289
4314
  CVE-2025-66035,2025-11-26T23:18:50Z,"Angular is Vulnerable to XSRF Token Leakage via Protocol-Relative URLs in Angular HTTP Client",@angular/common,21.0.0-next.0,21.0.1,,HIGH,CWE-201;CWE-359
4315
+ CVE-2025-66202,2025-12-08T16:26:43Z,"Astro has an Authentication Bypass via Double URL Encoding, a bypass for CVE-2025-64765",astro,0,5.15.8,,MODERATE,CWE-647
4290
4316
  CVE-2025-66219,2025-11-26T22:09:27Z,"willitmerge has a Command Injection vulnerability",willitmerge,0,,0.2.1,MODERATE,CWE-77
4291
4317
  CVE-2025-6624,2025-06-26T06:31:04Z,"Snyk CLI Insertion of Sensitive Information into Log File allowed in DEBUG or DEBUG/TRACE mode",snyk,0,1.1297.3,,LOW,CWE-532
4292
4318
  CVE-2025-66400,2025-12-02T01:25:46Z,"mdast-util-to-hast has unsanitized class attribute",mdast-util-to-hast,13.0.0,13.2.1,,MODERATE,CWE-20;CWE-915
@@ -4307,14 +4333,26 @@ CVE-2025-66421,2025-11-30T03:30:26Z,"Tryton sao allows XSS because it does not e
4307
4333
  CVE-2025-66421,2025-11-30T03:30:26Z,"Tryton sao allows XSS because it does not escape completion values",tryton-sao,7.0.0,7.0.40,,MODERATE,CWE-79
4308
4334
  CVE-2025-66421,2025-11-30T03:30:26Z,"Tryton sao allows XSS because it does not escape completion values",tryton-sao,7.1.0,7.4.21,,MODERATE,CWE-79
4309
4335
  CVE-2025-66421,2025-11-30T03:30:26Z,"Tryton sao allows XSS because it does not escape completion values",tryton-sao,7.5.0,7.6.11,,MODERATE,CWE-79
4310
- CVE-2025-66478,2025-12-03T19:07:11Z,"Next.js is vulnerable to RCE in React flight protocol",next,14.3.0-canary.77,15.0.5,,CRITICAL,CWE-502
4311
- CVE-2025-66478,2025-12-03T19:07:11Z,"Next.js is vulnerable to RCE in React flight protocol",next,15.1.0-canary.0,15.1.9,,CRITICAL,CWE-502
4312
- CVE-2025-66478,2025-12-03T19:07:11Z,"Next.js is vulnerable to RCE in React flight protocol",next,15.2.0-canary.0,15.2.6,,CRITICAL,CWE-502
4313
- CVE-2025-66478,2025-12-03T19:07:11Z,"Next.js is vulnerable to RCE in React flight protocol",next,15.3.0-canary.0,15.3.6,,CRITICAL,CWE-502
4314
- CVE-2025-66478,2025-12-03T19:07:11Z,"Next.js is vulnerable to RCE in React flight protocol",next,15.4.0-canary.0,15.4.8,,CRITICAL,CWE-502
4315
- CVE-2025-66478,2025-12-03T19:07:11Z,"Next.js is vulnerable to RCE in React flight protocol",next,15.5.0-canary.0,15.5.7,,CRITICAL,CWE-502
4316
- CVE-2025-66478,2025-12-03T19:07:11Z,"Next.js is vulnerable to RCE in React flight protocol",next,16.0.0-canary.0,16.0.7,,CRITICAL,CWE-502
4336
+ CVE-2025-66456,2025-12-09T17:11:53Z,"Elysia vulnerable to prototype pollution with multiple standalone schema validation",elysia,1.4.0,1.4.17,,CRITICAL,CWE-1321
4337
+ CVE-2025-66457,2025-12-09T17:12:05Z,"Elysia affected by arbitrary code injection through cookie config",elysia,0,1.4.18,,HIGH,CWE-94
4317
4338
  CVE-2025-66479,2025-12-04T16:55:06Z,"Anthropic Sandbox Runtime Incorrectly Implemented Network Sandboxing ","@anthropic-ai/sandbox-runtime",0,0.0.16,,LOW,CWE-693
4339
+ CVE-2025-67489,2025-12-08T22:16:31Z,"@vitejs/plugin-rsc Remote Code Execution through unsafe dynamic imports in RSC server function APIs on development server",@vitejs/plugin-rsc,0,0.5.6,,CRITICAL,CWE-94
4340
+ CVE-2025-67490,2025-12-10T21:31:24Z,"Improper Request Caching Lookup in the Auth0 Next.js SDK",@auth0/nextjs-auth0,4.11.0,4.11.2,,MODERATE,CWE-863
4341
+ CVE-2025-67490,2025-12-10T21:31:24Z,"Improper Request Caching Lookup in the Auth0 Next.js SDK",@auth0/nextjs-auth0,4.12.0,4.12.1,,MODERATE,CWE-863
4342
+ CVE-2025-67716,2025-12-10T21:35:58Z,"Improper Validation of Query Parameters in Auth0 Next.js SDK",@auth0/nextjs-auth0,4.9.0,4.13.0,,LOW,CWE-184
4343
+ CVE-2025-67718,2025-12-10T20:11:40Z,"Formio improperly authorized permission elevation through specially crafted request path",formio,0,3.5.7,,HIGH,CWE-178
4344
+ CVE-2025-67718,2025-12-10T20:11:40Z,"Formio improperly authorized permission elevation through specially crafted request path",formio,4.0.0-rc.1,4.4.3,,HIGH,CWE-178
4345
+ CVE-2025-67731,2025-12-11T18:36:54Z,"Servify-express rate limit issue",servify-express,0,1.2,,HIGH,CWE-770
4346
+ CVE-2025-67750,2025-12-12T20:20:34Z,"Lightning Flow Scanner Vulnerable to Code Injection via Unsafe Use of `new Function()` in APIVersion Rule",lightning-flow-scanner,0,6.10.6,,HIGH,CWE-94
4347
+ CVE-2025-67779,2025-12-12T16:32:43Z,"Denial of Service Vulnerability in React Server Components","react-server-dom-turbopack",19.0.2,19.0.3,,HIGH,CWE-400;CWE-502
4348
+ CVE-2025-67779,2025-12-12T16:32:43Z,"Denial of Service Vulnerability in React Server Components","react-server-dom-turbopack",19.1.3,19.1.4,,HIGH,CWE-400;CWE-502
4349
+ CVE-2025-67779,2025-12-12T16:32:43Z,"Denial of Service Vulnerability in React Server Components","react-server-dom-turbopack",19.2.2,19.2.3,,HIGH,CWE-400;CWE-502
4350
+ CVE-2025-67779,2025-12-12T16:32:43Z,"Denial of Service Vulnerability in React Server Components",react-server-dom-parcel,19.0.2,19.0.3,,HIGH,CWE-400;CWE-502
4351
+ CVE-2025-67779,2025-12-12T16:32:43Z,"Denial of Service Vulnerability in React Server Components",react-server-dom-parcel,19.1.3,19.1.4,,HIGH,CWE-400;CWE-502
4352
+ CVE-2025-67779,2025-12-12T16:32:43Z,"Denial of Service Vulnerability in React Server Components",react-server-dom-parcel,19.2.2,19.2.3,,HIGH,CWE-400;CWE-502
4353
+ CVE-2025-67779,2025-12-12T16:32:43Z,"Denial of Service Vulnerability in React Server Components",react-server-dom-webpack,19.0.2,19.0.3,,HIGH,CWE-400;CWE-502
4354
+ CVE-2025-67779,2025-12-12T16:32:43Z,"Denial of Service Vulnerability in React Server Components",react-server-dom-webpack,19.1.3,19.1.4,,HIGH,CWE-400;CWE-502
4355
+ CVE-2025-67779,2025-12-12T16:32:43Z,"Denial of Service Vulnerability in React Server Components",react-server-dom-webpack,19.2.2,19.2.3,,HIGH,CWE-400;CWE-502
4318
4356
  CVE-2025-7338,2025-07-17T21:01:54Z,"Multer vulnerable to Denial of Service via unhandled exception from malformed request",multer,1.4.4-lts.1,2.0.2,,HIGH,CWE-248
4319
4357
  CVE-2025-7339,2025-07-17T21:17:19Z,"on-headers is vulnerable to http response header manipulation",on-headers,0,1.1.0,,LOW,CWE-241
4320
4358
  CVE-2025-7783,2025-07-21T19:04:54Z,"form-data uses unsafe random function in form-data for choosing boundary",form-data,0,2.5.4,,CRITICAL,CWE-330
@@ -4322,6 +4360,8 @@ CVE-2025-7783,2025-07-21T19:04:54Z,"form-data uses unsafe random function in for
4322
4360
  CVE-2025-7783,2025-07-21T19:04:54Z,"form-data uses unsafe random function in form-data for choosing boundary",form-data,4.0.0,4.0.4,,CRITICAL,CWE-330
4323
4361
  CVE-2025-8020,2025-07-23T06:33:50Z,"private-ip vulnerable to Server-Side Request Forgery",private-ip,0,,3.0.2,HIGH,CWE-918
4324
4362
  CVE-2025-8021,2025-07-23T06:33:50Z,"files-bucket-server vulnerable to Directory Traversal",files-bucket-server,0,,1.2.6,HIGH,CWE-22
4363
+ CVE-2025-8082,2025-12-12T21:31:38Z,"Vuetify has a Cross-site Scripting (XSS) vulnerability in the VDatePicker component",vuetify,2.0.0,3.0.0,,MODERATE,CWE-79
4364
+ CVE-2025-8083,2025-12-12T21:31:38Z,"Vuetify has a Prototype Pollution vulnerability",vuetify,2.2.0-beta.2,3.0.0-alpha.10,,HIGH,CWE-1321
4325
4365
  CVE-2025-8101,2025-07-26T00:30:32Z,"Linkify Allows Prototype Pollution & HTML Attribute Injection (XSS)",linkifyjs,0,4.3.2,,HIGH,CWE-1321
4326
4366
  CVE-2025-8129,2025-07-29T19:11:25Z,"Koa Open Redirect via Referrer Header (User-Controlled)",koa,2.0.0,2.16.2,,LOW,CWE-601
4327
4367
  CVE-2025-8129,2025-07-29T19:11:25Z,"Koa Open Redirect via Referrer Header (User-Controlled)",koa,3.0.0-alpha.0,3.0.1,,LOW,CWE-601
@@ -4508,6 +4548,16 @@ GHSA-5g6j-8hv4-vfgj,2020-09-11T21:21:19Z,"Cross-Site Scripting in node-red",node
4508
4548
  GHSA-5ggx-g294-qj3q,2020-09-03T21:47:29Z,"Malicious Package in buffeb-xor",buffeb-xor,0.0.0,,,CRITICAL,CWE-506
4509
4549
  GHSA-5hx7-77g4-wqx3,2021-02-23T21:30:56Z,"Incorrect Authorization",aedes,0.1.0,0.35.1,,MODERATE,
4510
4550
  GHSA-5j4m-89xf-mf5p,2020-08-27T22:58:46Z,"Missing Origin Validation in parcel-bundler",parcel-bundler,0,1.10.0,,MODERATE,
4551
+ GHSA-5j59-xgg2-r9c4,2025-12-12T17:21:57Z,"Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up",next,13.3.1-canary.0,14.2.35,,HIGH,CWE-1395;CWE-400;CWE-502
4552
+ GHSA-5j59-xgg2-r9c4,2025-12-12T17:21:57Z,"Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up",next,15.0.6,15.0.7,,HIGH,CWE-1395;CWE-400;CWE-502
4553
+ GHSA-5j59-xgg2-r9c4,2025-12-12T17:21:57Z,"Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up",next,15.1.10,15.1.11,,HIGH,CWE-1395;CWE-400;CWE-502
4554
+ GHSA-5j59-xgg2-r9c4,2025-12-12T17:21:57Z,"Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up",next,15.2.7,15.2.8,,HIGH,CWE-1395;CWE-400;CWE-502
4555
+ GHSA-5j59-xgg2-r9c4,2025-12-12T17:21:57Z,"Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up",next,15.3.7,15.3.8,,HIGH,CWE-1395;CWE-400;CWE-502
4556
+ GHSA-5j59-xgg2-r9c4,2025-12-12T17:21:57Z,"Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up",next,15.4.9,15.4.10,,HIGH,CWE-1395;CWE-400;CWE-502
4557
+ GHSA-5j59-xgg2-r9c4,2025-12-12T17:21:57Z,"Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up",next,15.5.8,15.5.9,,HIGH,CWE-1395;CWE-400;CWE-502
4558
+ GHSA-5j59-xgg2-r9c4,2025-12-12T17:21:57Z,"Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up",next,15.6.0-canary.59,15.6.0-canary.60,,HIGH,CWE-1395;CWE-400;CWE-502
4559
+ GHSA-5j59-xgg2-r9c4,2025-12-12T17:21:57Z,"Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up",next,16.0.9,16.0.10,,HIGH,CWE-1395;CWE-400;CWE-502
4560
+ GHSA-5j59-xgg2-r9c4,2025-12-12T17:21:57Z,"Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up",next,16.1.0-canary.17,16.1.0-canary.19,,HIGH,CWE-1395;CWE-400;CWE-502
4511
4561
  GHSA-5jgp-pg4f-q8vj,2020-09-03T19:55:42Z,"Malicious Package in node-ftp",node-ftp,0.0.0,,,CRITICAL,CWE-506
4512
4562
  GHSA-5jpx-9hw9-2fx4,2025-10-29T10:43:57Z,"NextAuthjs Email misdelivery Vulnerability",next-auth,0,4.24.12,,MODERATE,CWE-200
4513
4563
  GHSA-5jpx-9hw9-2fx4,2025-10-29T10:43:57Z,"NextAuthjs Email misdelivery Vulnerability",next-auth,5.0.0-beta.0,5.0.0-beta.30,,MODERATE,CWE-200
@@ -4531,6 +4581,7 @@ GHSA-5x8q-gj67-rhf2,2020-09-02T21:18:33Z,"Malicious Package in discord_debug_log
4531
4581
  GHSA-629c-j867-3v45,2020-09-04T16:41:04Z,"Malicious Package in bitcoisnj-lib",bitcoisnj-lib,0.0.0,,,CRITICAL,CWE-506
4532
4582
  GHSA-6343-m2qr-66gf,2020-09-03T23:10:41Z,"Malicious Package in js-sja3",js-sja3,0.0.0,,,CRITICAL,CWE-506
4533
4583
  GHSA-6394-6h9h-cfjg,2019-06-07T21:12:35Z,"Regular Expression Denial of Service",nwmatcher,0,1.4.4,,MODERATE,CWE-400
4584
+ GHSA-644f-hrff-mf96,2025-12-02T18:30:35Z,"Duplicate Advisory: Authentication Bypass via Default JWT Secret in NocoBase docker-compose Deployments",@nocobase/auth,0,1.9.23,,LOW,
4534
4585
  GHSA-6495-8jvh-f28x,2020-10-02T15:39:54Z,"File restriction bypass in socket.io-file",socket.io-file,0,,2.0.31,HIGH,CWE-20
4535
4586
  GHSA-64g7-mvw6-v9qj,2022-01-14T21:09:50Z,"Improper Privilege Management in shelljs",shelljs,0,0.8.5,,MODERATE,CWE-269
4536
4587
  GHSA-657v-jjf8-83gh,2020-09-03T23:14:55Z,"Malicious Package in jsmsha3",jsmsha3,0.0.0,,,CRITICAL,CWE-506
@@ -4739,6 +4790,13 @@ GHSA-9q64-mpxx-87fg,2020-04-01T16:35:08Z,"Open Redirect in ecstatic",ecstatic,3.
4739
4790
  GHSA-9q64-mpxx-87fg,2020-04-01T16:35:08Z,"Open Redirect in ecstatic",ecstatic,4.0.0,4.1.2,,HIGH,CWE-601
4740
4791
  GHSA-9q9m-m2f6-jr5q,2020-09-02T20:22:34Z,"Malicious Package in chak",chak,0,,,CRITICAL,CWE-506
4741
4792
  GHSA-9qgh-7pgp-hp7r,2020-09-03T17:10:31Z,"Cross-Site Scripting in graylog-web-interface",graylog-web-interface,0.0.0,,,HIGH,CWE-79
4793
+ GHSA-9qr9-h5gf-34mp,2025-12-03T19:07:11Z,"Next.js is vulnerable to RCE in React flight protocol",next,14.3.0-canary.77,15.0.5,,CRITICAL,CWE-502
4794
+ GHSA-9qr9-h5gf-34mp,2025-12-03T19:07:11Z,"Next.js is vulnerable to RCE in React flight protocol",next,15.1.0-canary.0,15.1.9,,CRITICAL,CWE-502
4795
+ GHSA-9qr9-h5gf-34mp,2025-12-03T19:07:11Z,"Next.js is vulnerable to RCE in React flight protocol",next,15.2.0-canary.0,15.2.6,,CRITICAL,CWE-502
4796
+ GHSA-9qr9-h5gf-34mp,2025-12-03T19:07:11Z,"Next.js is vulnerable to RCE in React flight protocol",next,15.3.0-canary.0,15.3.6,,CRITICAL,CWE-502
4797
+ GHSA-9qr9-h5gf-34mp,2025-12-03T19:07:11Z,"Next.js is vulnerable to RCE in React flight protocol",next,15.4.0-canary.0,15.4.8,,CRITICAL,CWE-502
4798
+ GHSA-9qr9-h5gf-34mp,2025-12-03T19:07:11Z,"Next.js is vulnerable to RCE in React flight protocol",next,15.5.0-canary.0,15.5.7,,CRITICAL,CWE-502
4799
+ GHSA-9qr9-h5gf-34mp,2025-12-03T19:07:11Z,"Next.js is vulnerable to RCE in React flight protocol",next,16.0.0-canary.0,16.0.7,,CRITICAL,CWE-502
4742
4800
  GHSA-9qrg-h9g8-c65q,2020-09-04T15:14:26Z,"Prototype Pollution in deep-setter",deep-setter,0.0.0,,,HIGH,CWE-1321
4743
4801
  GHSA-9qrm-48qf-r2rw,2025-01-23T22:36:50Z,"Directus has a DOM-Based cross-site scripting (XSS) via layout_options",directus,0,11.3.3,,LOW,
4744
4802
  GHSA-9r27-994c-4xch,2020-02-24T17:34:02Z,"discord-html not escaping HTML code blocks when lacking a language identifier",discord-markdown,0,2.3.1,,HIGH,
@@ -4752,7 +4810,7 @@ GHSA-9vrw-m88g-w75q,2020-09-03T15:45:53Z,"Denial of Service in @hapi/accept",@ha
4752
4810
  GHSA-9w87-4j72-gcv7,2020-09-02T18:27:54Z,"Insecure Default Configuration in graphql-code-generator",graphql-code-generator,0,0.18.2,,HIGH,
4753
4811
  GHSA-9wjh-jr2j-6r4x,2020-09-02T15:55:58Z,"Remote Code Execution in pi_video_recording",pi_video_recording,0,,,HIGH,CWE-20
4754
4812
  GHSA-9wx7-jrvc-28mm,2021-11-08T21:51:18Z,"Signature verification vulnerability in Stark Bank ecdsa libraries",starkbank-ecdsa,1.1.2,1.1.3,,HIGH,CWE-347
4755
- GHSA-9x4v-xfq5-m8x5,2025-02-05T21:49:39Z,"Better Auth URL parameter HTML Injection (Reflected Cross-Site scripting)",better-auth,0.0.2,1.1.16,,CRITICAL,CWE-79
4813
+ GHSA-9x4v-xfq5-m8x5,2025-02-05T21:49:39Z,"Better Auth URL parameter HTML Injection (Reflected Cross-Site scripting)",better-auth,0.0.2,1.1.16,,MODERATE,CWE-79
4756
4814
  GHSA-9xgp-hfw7-73rq,2020-08-19T21:30:04Z,"Authentication Weakness in keystone",keystone,0,0.3.16,,MODERATE,
4757
4815
  GHSA-9xr8-8hmc-389f,2019-11-22T13:45:33Z,"Cross-Site Scripting in vant",vant,0,2.1.8,,HIGH,CWE-79
4758
4816
  GHSA-9xww-fwh9-95c5,2020-09-02T21:43:59Z,"Malicious Package in uglyfi-js",uglyfi-js,0,,,CRITICAL,CWE-506
@@ -4770,6 +4828,7 @@ GHSA-c5j4-vw9m-xc95,2020-08-27T22:44:08Z,"Open Redirect in hekto",hekto,0,0.2.4,
4770
4828
  GHSA-c5xm-m64m-f2vq,2020-09-04T15:23:47Z,"Malicious Package in cxct",cxct,0.0.0,,,CRITICAL,CWE-506
4771
4829
  GHSA-c6f3-3c98-2j2f,2020-09-02T21:39:46Z,"Malicious Package in jquerz",jquerz,0,,,CRITICAL,CWE-506
4772
4830
  GHSA-c6h2-mpc6-232h,2020-08-27T22:26:15Z,"Command Injection in dns-sync",dns-sync,0,0.1.3,,MODERATE,
4831
+ GHSA-c6m7-q6pr-c64r,2025-12-12T16:41:58Z,"Vite Plugin React has a Source Code Exposure Vulnerability in React Server Components",@vitejs/plugin-rsc,0,0.5.7,,MODERATE,CWE-1395;CWE-497;CWE-502
4773
4832
  GHSA-c7pp-x73h-4m2v,2020-09-02T15:53:46Z,"Cross-Site Scripting in bootstrap-vue",bootstrap-vue,0,2.0.0-rc.12,,HIGH,CWE-79
4774
4833
  GHSA-ccq6-3qx5-vmqx,2018-07-31T22:54:14Z,"Moderate severity vulnerability that affects is-my-json-valid",is-my-json-valid,0,2.12.4,,MODERATE,
4775
4834
  GHSA-ccrp-c664-8p4j,2020-09-03T21:17:36Z,"Cross-Site Scripting in markdown-to-jsx",markdown-to-jsx,0,6.11.4,,HIGH,CWE-79
@@ -4788,6 +4847,7 @@ GHSA-chh2-rvhg-wqwr,2020-09-03T21:02:10Z,"Malicious Package in json-serializer",
4788
4847
  GHSA-cp47-r258-q626,2023-03-02T23:36:22Z," Vega vulnerable to arbitrary code execution when clicking href links",vega,0,4.5.1,,MODERATE,
4789
4848
  GHSA-cp47-r258-q626,2023-03-02T23:36:22Z," Vega vulnerable to arbitrary code execution when clicking href links",vega,5.0.0,5.4.1,,MODERATE,
4790
4849
  GHSA-cpgr-wmr9-qxv4,2020-09-11T21:20:14Z,"Cross-Site Scripting in serve",serve,0,10.0.2,,MODERATE,CWE-79
4850
+ GHSA-cpqf-f22c-r95x,2025-12-12T16:41:08Z,"Vite Plugin React has a Denial of Service Vulnerability in React Server Components",@vitejs/plugin-rsc,0,0.5.7,,HIGH,CWE-1395;CWE-400;CWE-502
4791
4851
  GHSA-cr4x-w2v7-4mmf,2020-09-03T22:26:13Z,"Malicious Package in bufver-xor",bufver-xor,0.0.0,,,CRITICAL,CWE-506
4792
4852
  GHSA-cr56-66mx-293v,2020-09-03T15:53:50Z,"Cross-Site Scripting in @toast-ui/editor",@toast-ui/editor,0,2.2.0,,HIGH,CWE-79
4793
4853
  GHSA-cr5w-6rv4-r2qg,2020-09-03T02:37:45Z,"Malicious Package in maleficent",maleficent,0,,,CRITICAL,CWE-506
@@ -5045,6 +5105,16 @@ GHSA-mvch-rh6h-2m47,2020-09-11T21:10:29Z,"Malicious Package in equest",equest,0,
5045
5105
  GHSA-mvrp-3cvx-c325,2023-10-04T14:46:06Z,"Zod denial of service vulnerability during email validation",express-zod-api,0,10.0.0-beta1,,HIGH,CWE-1333
5046
5106
  GHSA-mvw6-62qv-vmqf,2025-07-25T06:30:30Z,"Duplicate Advisory: Koa Open Redirect via Referrer Header (User-Controlled)",koa,0,3.0.1,,LOW,CWE-601
5047
5107
  GHSA-mwp6-j9wf-968c,2019-09-13T21:33:25Z,"Critical severity vulnerability that affects generator-jhipster",generator-jhipster,0,6.3.0,,CRITICAL,CWE-338
5108
+ GHSA-mwv6-3258-q52c,2025-12-11T22:49:27Z,"Next Vulnerable to Denial of Service with Server Components",next,13.3.0,14.2.34,,HIGH,CWE-1395;CWE-400;CWE-502
5109
+ GHSA-mwv6-3258-q52c,2025-12-11T22:49:27Z,"Next Vulnerable to Denial of Service with Server Components",next,15.0.0-canary.0,15.0.6,,HIGH,CWE-1395;CWE-400;CWE-502
5110
+ GHSA-mwv6-3258-q52c,2025-12-11T22:49:27Z,"Next Vulnerable to Denial of Service with Server Components",next,15.1.1-canary.0,15.1.10,,HIGH,CWE-1395;CWE-400;CWE-502
5111
+ GHSA-mwv6-3258-q52c,2025-12-11T22:49:27Z,"Next Vulnerable to Denial of Service with Server Components",next,15.2.0-canary.0,15.2.7,,HIGH,CWE-1395;CWE-400;CWE-502
5112
+ GHSA-mwv6-3258-q52c,2025-12-11T22:49:27Z,"Next Vulnerable to Denial of Service with Server Components",next,15.3.0-canary.0,15.3.7,,HIGH,CWE-1395;CWE-400;CWE-502
5113
+ GHSA-mwv6-3258-q52c,2025-12-11T22:49:27Z,"Next Vulnerable to Denial of Service with Server Components",next,15.4.0-canary.0,15.4.9,,HIGH,CWE-1395;CWE-400;CWE-502
5114
+ GHSA-mwv6-3258-q52c,2025-12-11T22:49:27Z,"Next Vulnerable to Denial of Service with Server Components",next,15.5.1-canary.0,15.5.8,,HIGH,CWE-1395;CWE-400;CWE-502
5115
+ GHSA-mwv6-3258-q52c,2025-12-11T22:49:27Z,"Next Vulnerable to Denial of Service with Server Components",next,15.6.0-canary.0,15.6.0-canary.59,,HIGH,CWE-1395;CWE-400;CWE-502
5116
+ GHSA-mwv6-3258-q52c,2025-12-11T22:49:27Z,"Next Vulnerable to Denial of Service with Server Components",next,16.0.0-beta.0,16.0.9,,HIGH,CWE-1395;CWE-400;CWE-502
5117
+ GHSA-mwv6-3258-q52c,2025-12-11T22:49:27Z,"Next Vulnerable to Denial of Service with Server Components",next,16.1.0-canary.0,16.1.0-canary.17,,HIGH,CWE-1395;CWE-400;CWE-502
5048
5118
  GHSA-mxjr-xmcg-fg7w,2019-06-27T17:25:21Z,"Arbitrary Code Injection in mobile-icon-resizer",mobile-icon-resizer,0.2.0,0.4.3,,MODERATE,CWE-94
5049
5119
  GHSA-mxmj-84q8-34r7,2020-09-03T02:39:49Z,"Command Injection in expressfs",expressfs,0,,,HIGH,CWE-77
5050
5120
  GHSA-mxq6-vrrr-ppmg,2022-05-24T17:04:00Z,"Duplicate Advisory: tree-kill vulnerable to remote code execution",tree-kill,0,,1.2.1,CRITICAL,CWE-94
@@ -5222,7 +5292,7 @@ GHSA-vm6v-w6q2-mrrq,2020-09-03T19:20:05Z,"Malicious Package in bb-builder",bb-bu
5222
5292
  GHSA-vm7j-4rj6-mw2p,2020-09-03T21:08:42Z,"Malicious Package in ember_cli_babe",ember_cli_babe,0.0.0,,,CRITICAL,CWE-506
5223
5293
  GHSA-vmh4-322v-cfpc,2020-09-03T18:18:06Z,"Cross-Site Scripting in cmmn-js-properties-panel",cmmn-js-properties-panel,0,0.8.0,,HIGH,CWE-79
5224
5294
  GHSA-vmhw-fhj6-m3g5,2019-05-31T23:46:33Z,"Path Traversal in angular-http-server",angular-http-server,0,1.4.4,,HIGH,CWE-22
5225
- GHSA-vp58-j275-797x,2025-02-24T20:49:50Z,"Better Auth allows bypassing the trustedOrigins Protection which leads to ATO",better-auth,0,1.1.21,,CRITICAL,CWE-601
5295
+ GHSA-vp58-j275-797x,2025-02-24T20:49:50Z,"Better Auth allows bypassing the trustedOrigins Protection which leads to ATO",better-auth,0,1.1.21,,HIGH,CWE-601
5226
5296
  GHSA-vp93-gcx5-4w52,2020-09-11T21:21:19Z,"Cross-Site Scripting in swagger-ui",swagger-ui,0,2.2.1,,MODERATE,CWE-79
5227
5297
  GHSA-vpgc-7h78-gx8f,2020-09-04T18:05:14Z,"personnummer/js vulnerable to Improper Input Validation",personnummer,0,3.1.0,,LOW,
5228
5298
  GHSA-vpj4-89q8-rh38,2020-09-03T18:16:59Z,"Cross-Site Scripting in bpmn-js-properties-panel",bpmn-js-properties-panel,0,0.31.0,,HIGH,CWE-79
@@ -5241,6 +5311,15 @@ GHSA-vxp4-25qp-86qh,2017-10-24T18:33:36Z,"Moderate severity vulnerability that a
5241
5311
  GHSA-vxp4-25qp-86qh,2017-10-24T18:33:36Z,"Moderate severity vulnerability that affects ember",ember,2.1.0,2.1.2,,MODERATE,
5242
5312
  GHSA-vxp4-25qp-86qh,2017-10-24T18:33:36Z,"Moderate severity vulnerability that affects ember",ember,2.2.0,2.2.1,,MODERATE,
5243
5313
  GHSA-w32g-5hqp-gg6q,2020-09-02T15:41:41Z,"Cross-Site Scripting in mermaid",mermaid,0,8.2.3,,HIGH,CWE-79
5314
+ GHSA-w37m-7fhw-fmv9,2025-12-11T22:49:56Z,"Next Server Actions Source Code Exposure ",next,15.0.0-canary.0,15.0.6,,MODERATE,CWE-1395;CWE-497;CWE-502
5315
+ GHSA-w37m-7fhw-fmv9,2025-12-11T22:49:56Z,"Next Server Actions Source Code Exposure ",next,15.1.1-canary.0,15.1.10,,MODERATE,CWE-1395;CWE-497;CWE-502
5316
+ GHSA-w37m-7fhw-fmv9,2025-12-11T22:49:56Z,"Next Server Actions Source Code Exposure ",next,15.2.0-canary.0,15.2.7,,MODERATE,CWE-1395;CWE-497;CWE-502
5317
+ GHSA-w37m-7fhw-fmv9,2025-12-11T22:49:56Z,"Next Server Actions Source Code Exposure ",next,15.3.0-canary.0,15.3.7,,MODERATE,CWE-1395;CWE-497;CWE-502
5318
+ GHSA-w37m-7fhw-fmv9,2025-12-11T22:49:56Z,"Next Server Actions Source Code Exposure ",next,15.4.0-canary.0,15.4.9,,MODERATE,CWE-1395;CWE-497;CWE-502
5319
+ GHSA-w37m-7fhw-fmv9,2025-12-11T22:49:56Z,"Next Server Actions Source Code Exposure ",next,15.5.1-canary.0,15.5.8,,MODERATE,CWE-1395;CWE-497;CWE-502
5320
+ GHSA-w37m-7fhw-fmv9,2025-12-11T22:49:56Z,"Next Server Actions Source Code Exposure ",next,15.6.0-canary.0,15.6.0-canary.59,,MODERATE,CWE-1395;CWE-497;CWE-502
5321
+ GHSA-w37m-7fhw-fmv9,2025-12-11T22:49:56Z,"Next Server Actions Source Code Exposure ",next,16.0.0-beta.0,16.0.9,,MODERATE,CWE-1395;CWE-497;CWE-502
5322
+ GHSA-w37m-7fhw-fmv9,2025-12-11T22:49:56Z,"Next Server Actions Source Code Exposure ",next,16.1.0-canary.0,16.1.0-canary.17,,MODERATE,CWE-1395;CWE-497;CWE-502
5244
5323
  GHSA-w3f3-4j22-2v3p,2020-09-02T21:27:02Z,"Malicious Package in destroyer-of-worlds",destroyer-of-worlds,0,,,CRITICAL,CWE-506
5245
5324
  GHSA-w3pp-wp5v-fjvp,2020-09-03T19:51:18Z,"Malicious Package in mogodb",mogodb,0.0.0,,,CRITICAL,CWE-506
5246
5325
  GHSA-w42g-7vfc-xf37,2020-06-05T19:38:14Z,"Introspection in schema validation in Apollo Server","apollo-server-azure-functions",0,2.14.2,,MODERATE,
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@openrewrite/recipes-nodejs",
3
- "version": "0.36.0-20251214-170412",
3
+ "version": "0.36.0-20251215-110739",
4
4
  "license": "Moderne Source Available License",
5
5
  "description": "OpenRewrite recipes for Node.js library migrations.",
6
6
  "homepage": "https://github.com/moderneinc/rewrite-node",