You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| January 2016 |`ws`|[Buffer vulnerability](https://github.com/advisories/GHSA-2mhh-w6q8-5hxw)|`CVE-2016-10518`|
43
-
| January 2016 |`ws`|[DoS due to excessively large websocket message](https://github.com/advisories/GHSA-6663-c963-2gqg)|`CVE-2016-10542`|
44
-
| November 2017 |`ws`|[DoS in the `Sec-Websocket-Extensions` header parser](https://github.com/advisories/GHSA-5v72-xg48-5rpm)|`-`|
45
-
| February 2020 |`engine.io`|[Resource exhaustion](https://github.com/advisories/GHSA-j4f2-536g-r55m)|`CVE-2020-36048`|
46
-
| January 2021 |`socket.io-parser`|[Resource exhaustion](https://github.com/advisories/GHSA-xfhh-g9f5-x4m4)|`CVE-2020-36049`|
47
-
| May 2021 |`ws`|[ReDoS in `Sec-Websocket-Protocol` header](https://github.com/advisories/GHSA-6fc8-4gx4-v693)|`CVE-2021-32640`|
48
-
| January 2022 |`engine.io`|[Uncaught exception](https://github.com/advisories/GHSA-273r-mgr4-v34f)|`CVE-2022-21676`|
49
-
| October 2022 |`socket.io-parser`|[Insufficient validation when decoding a Socket.IO packet](https://github.com/advisories/GHSA-qm95-pgcg-qqfq)|`CVE-2022-2421`|
50
-
| November 2022 |`engine.io`|[Uncaught exception](https://github.com/advisories/GHSA-r7qp-cfhv-p84w)|`CVE-2022-41940`|
51
-
| May 2023 |`engine.io`|[Uncaught exception](https://github.com/advisories/GHSA-q9mw-68c2-j6m5)|`CVE-2023-31125`|
52
-
| May 2023 |`socket.io-parser`|[Insufficient validation when decoding a Socket.IO packet](https://github.com/advisories/GHSA-cqmj-92xf-r6r9)|`CVE-2023-32695`|
53
-
| June 2024 |`ws`|[DoS when handling a request with many HTTP headers](https://github.com/advisories/GHSA-3h5v-q93c-6h6q)|`CVE-2024-37890`|
| January 2016 |`ws`|[Buffer vulnerability](https://github.com/advisories/GHSA-2mhh-w6q8-5hxw)|`CVE-2016-10518`|
43
+
| January 2016 |`ws`|[DoS due to excessively large websocket message](https://github.com/advisories/GHSA-6663-c963-2gqg)|`CVE-2016-10542`|
44
+
| November 2017 |`ws`|[DoS in the `Sec-Websocket-Extensions` header parser](https://github.com/advisories/GHSA-5v72-xg48-5rpm)|`-`|
45
+
| February 2020 |`engine.io`|[Resource exhaustion](https://github.com/advisories/GHSA-j4f2-536g-r55m)|`CVE-2020-36048`|
46
+
| January 2021 |`socket.io-parser`|[Resource exhaustion](https://github.com/advisories/GHSA-xfhh-g9f5-x4m4)|`CVE-2020-36049`|
47
+
| May 2021 |`ws`|[ReDoS in `Sec-Websocket-Protocol` header](https://github.com/advisories/GHSA-6fc8-4gx4-v693)|`CVE-2021-32640`|
48
+
| January 2022 |`engine.io`|[Uncaught exception](https://github.com/advisories/GHSA-273r-mgr4-v34f)|`CVE-2022-21676`|
49
+
| October 2022 |`socket.io-parser`|[Insufficient validation when decoding a Socket.IO packet](https://github.com/advisories/GHSA-qm95-pgcg-qqfq)|`CVE-2022-2421`|
50
+
| November 2022 |`engine.io`|[Uncaught exception](https://github.com/advisories/GHSA-r7qp-cfhv-p84w)|`CVE-2022-41940`|
51
+
| May 2023 |`engine.io`|[Uncaught exception](https://github.com/advisories/GHSA-q9mw-68c2-j6m5)|`CVE-2023-31125`|
52
+
| May 2023 |`socket.io-parser`|[Insufficient validation when decoding a Socket.IO packet](https://github.com/advisories/GHSA-cqmj-92xf-r6r9)|`CVE-2023-32695`|
53
+
| June 2024 |`ws`|[DoS when handling a request with many HTTP headers](https://github.com/advisories/GHSA-3h5v-q93c-6h6q)|`CVE-2024-37890`|
54
+
| March 2026 |`socket.io-parser`|[Unbounded number of binary attachments](https://github.com/socketio/socket.io/security/advisories/GHSA-677m-j7p3-52f9)|`CVE-2026-33151`|
| January 2016 |`ws`|[Buffer vulnerability](https://github.com/advisories/GHSA-2mhh-w6q8-5hxw)|`CVE-2016-10518`|
62
-
| January 2016 |`ws`|[DoS due to excessively large websocket message](https://github.com/advisories/GHSA-6663-c963-2gqg)|`CVE-2016-10542`|
63
-
| October 2016 |`engine.io-client`|[Insecure Defaults Allow MITM Over TLS](https://github.com/advisories/GHSA-4r4m-hjwj-43p8)|`CVE-2016-10536`|
64
-
| November 2017 |`ws`|[DoS in the `Sec-Websocket-Extensions` header parser](https://github.com/advisories/GHSA-5v72-xg48-5rpm)|`-`|
65
-
| January 2021 |`socket.io-parser`|[Resource exhaustion](https://github.com/advisories/GHSA-xfhh-g9f5-x4m4)|`CVE-2020-36049`|
66
-
| May 2021 |`ws`|[ReDoS in `Sec-Websocket-Protocol` header](https://github.com/advisories/GHSA-6fc8-4gx4-v693)|`CVE-2021-32640`|
67
-
| October 2022 |`socket.io-parser`|[Insufficient validation when decoding a Socket.IO packet](https://github.com/advisories/GHSA-qm95-pgcg-qqfq)|`CVE-2022-2421`|
68
-
| May 2023 |`socket.io-parser`|[Insufficient validation when decoding a Socket.IO packet](https://github.com/advisories/GHSA-cqmj-92xf-r6r9)|`CVE-2023-32695`|
69
-
| June 2024 |`ws`|[DoS when handling a request with many HTTP headers](https://github.com/advisories/GHSA-3h5v-q93c-6h6q)|`CVE-2024-37890`|
| January 2016 |`ws`|[Buffer vulnerability](https://github.com/advisories/GHSA-2mhh-w6q8-5hxw)|`CVE-2016-10518`|
63
+
| January 2016 |`ws`|[DoS due to excessively large websocket message](https://github.com/advisories/GHSA-6663-c963-2gqg)|`CVE-2016-10542`|
64
+
| October 2016 |`engine.io-client`|[Insecure Defaults Allow MITM Over TLS](https://github.com/advisories/GHSA-4r4m-hjwj-43p8)|`CVE-2016-10536`|
65
+
| November 2017 |`ws`|[DoS in the `Sec-Websocket-Extensions` header parser](https://github.com/advisories/GHSA-5v72-xg48-5rpm)|`-`|
66
+
| January 2021 |`socket.io-parser`|[Resource exhaustion](https://github.com/advisories/GHSA-xfhh-g9f5-x4m4)|`CVE-2020-36049`|
67
+
| May 2021 |`ws`|[ReDoS in `Sec-Websocket-Protocol` header](https://github.com/advisories/GHSA-6fc8-4gx4-v693)|`CVE-2021-32640`|
68
+
| October 2022 |`socket.io-parser`|[Insufficient validation when decoding a Socket.IO packet](https://github.com/advisories/GHSA-qm95-pgcg-qqfq)|`CVE-2022-2421`|
69
+
| May 2023 |`socket.io-parser`|[Insufficient validation when decoding a Socket.IO packet](https://github.com/advisories/GHSA-cqmj-92xf-r6r9)|`CVE-2023-32695`|
70
+
| June 2024 |`ws`|[DoS when handling a request with many HTTP headers](https://github.com/advisories/GHSA-3h5v-q93c-6h6q)|`CVE-2024-37890`|
71
+
| March 2026 |`socket.io-parser`|[Unbounded number of binary attachments](https://github.com/socketio/socket.io/security/advisories/GHSA-677m-j7p3-52f9)|`CVE-2026-33151`|
0 commit comments