VYPR

apk package

chainguard/code-server-compat

pkg:apk/chainguard/code-server-compat

Vulnerabilities (32)

  • CVE-2025-15284Dec 29, 2025
    affected < 4.106.3-r1fixed 4.106.3-r1

    Improper Input Validation vulnerability in qs (parse modules) allows HTTP DoS.This issue affects qs: < 6.14.1. Summary The arrayLimit option in qs did not enforce limits for bracket notation (a[]=1&a[]=2), only for indexed notation (a[0]=1). This is a consistency bug; arrayLim

  • CVE-2025-13466MedNov 24, 2025
    affected < 4.106.2-r1fixed 4.106.2-r1

    body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and mem

  • CVE-2025-64718Nov 13, 2025
    affected < 4.106.2-r0fixed 4.106.2-r0

    js-yaml is a JavaScript YAML parser and dumper. In js-yaml before 4.1.1 and 3.14.2, it's possible for an attacker to modify the prototype of the result of a parsed yaml document via prototype pollution (`__proto__`). All users who parse untrusted yaml documents may be impacted. T

  • CVE-2025-59343HigSep 24, 2025
    affected < 4.105.1-r1fixed 4.105.1-r1

    tar-fs provides filesystem bindings for tar-stream. Versions prior to 3.1.1, 2.1.3, and 1.16.5 are vulnerable to symlink validation bypass if the destination directory is predictable with a specific tarball. This issue has been patched in version 3.1.1, 2.1.4, and 1.16.6. A worka

  • CVE-2025-7339LowJul 17, 2025
    affected < 4.102.1-r0fixed 4.102.1-r0

    on-headers is a node.js middleware for listening to when a response writes headers. A bug in on-headers versions `<1.1.0` may result in response headers being inadvertently modified when an array is passed to `response.writeHead()`. Users should upgrade to version 1.1.0 to receiv

  • CVE-2025-5889LowJun 9, 2025
    affected < 4.100.3-r1fixed 4.100.3-r1

    A vulnerability was found in juliangruber brace-expansion up to 1.1.11/2.0.1/3.0.0/4.0.0. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be l

  • CVE-2025-48387HigJun 2, 2025
    affected < 4.105.1-r1fixed 4.105.1-r1

    tar-fs provides filesystem bindings for tar-stream. Versions prior to 3.0.9, 2.1.3, and 1.16.5 have an issue where an extract can write outside the specified dir with a specific tarball. This has been patched in versions 3.0.9, 2.1.3, and 1.16.5. As a workaround, use the ignore o

  • CVE-2025-47279LowMay 15, 2025
    affected < 4.100.2-r1fixed 4.100.2-r1

    Undici is an HTTP/1.1 client for Node.js. Prior to versions 5.29.0, 6.21.2, and 7.5.0, applications that use undici to implement a webhook-like system are vulnerable. If the attacker set up a server with an invalid certificate, and they can force the application to call the webho

  • CVE-2025-47269HigMay 9, 2025
    affected < 0fixed 0

    code-server runs VS Code on any machine anywhere through browser access. Prior to version 4.99.4, a maliciously crafted URL using the proxy subpath can result in the attacker gaining access to the session token. Failure to properly validate the port for a proxy request can result

  • CVE-2024-12905HigMar 27, 2025
    affected < 4.105.1-r1fixed 4.105.1-r1

    An Improper Link Resolution Before File Access ("Link Following") and Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal"). This vulnerability occurs when extracting a maliciously crafted tar file, which can result in unauthorized file writes or overwrit

  • CVE-2024-36361MedMay 24, 2024
    affected < 0fixed 0

    Pug through 3.0.2 allows JavaScript code execution if an application accepts untrusted input for the name option of the compileClient, compileFileClient, or compileClientWithDependenciesTracked function. NOTE: these functions are for compiling Pug templates into JavaScript, and t

  • CVE-2023-26114Mar 23, 2023
    affected < 0fixed 0

    Versions of the package code-server before 4.10.1 are vulnerable to Missing Origin Validation in WebSockets handshakes. Exploiting this vulnerability can allow an adversary in specific scenarios to access data from and connect to the code-server instance.

  • CVE-2021-42648May 11, 2022
    affected < 0fixed 0

    Cross-site scripting (XSS) vulnerability exists in Coder Code-Server before 3.12.0, allows attackers to execute arbitrary code via crafted URL.

  • CVE-2022-1537May 10, 2022
    affected < 0fixed 0

    file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in GitHub repository gruntjs/grunt prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if

  • CVE-2022-0436Apr 12, 2022
    affected < 0fixed 0

    Path Traversal in GitHub repository gruntjs/grunt prior to 1.5.2.

  • CVE-2021-3810Sep 17, 2021
    affected < 0fixed 0

    code-server is vulnerable to Inefficient Regular Expression Complexity

  • CVE-2021-23383May 4, 2021
    affected < 0fixed 0

    The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source.

  • CVE-2021-23369Apr 12, 2021
    affected < 0fixed 0

    The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.

  • CVE-2021-21353Mar 3, 2021
    affected < 0fixed 0

    Pug is an npm package which is a high-performance template engine. In pug before version 3.0.1, if a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug temp

  • CVE-2020-7788Dec 11, 2020
    affected < 0fixed 0

    This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.

Page 1 of 2