An implementation of a [Signal K](http://signalk.org) server for boats.
84%
Total Score
72
100
100
100
50
| Title | Versions | Severity |
|---|---|---|
CVE-2026-25228 signalk-server is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in versions 0.0.0 - 2.20.2. | 0.0.0 - 2.20.2 | Medium |
AIKIDO-2026-10079 Pre-CVE Found by Aikido Intel before public disclosure or CVE publication. signalk-server is vulnerable to Prototype Pollution in versions 1.27.0 - 2.19.1. | 1.27.0 - 2.19.1 | High |
CVE-2025-68620 signalk-server is vulnerable to Authentication Bypass Using an Alternate Path or Channel in versions 0.0.0 - 2.19.0. | 0.0.0 - 2.19.0 | Critical |
CVE-2025-69203 signalk-server is vulnerable to Authentication Bypass by Spoofing in versions 0.0.0 - 2.19.0. | 0.0.0 - 2.19.0 | Medium |
CVE-2025-68619 signalk-server is vulnerable to Improper Control of Generation of Code ('Code Injection') in versions 0.0.0 - 2.9.0. | 0.0.0 - 2.9.0 | High |
| Dependency | Last Release | Score |
|---|---|---|
ms Version ^2.1.2 | — | — |
ws Version ^8.17.0 | — | — |
fix Version ^0.0.6 | — | — |
ncp Version ^2.0.0 | — | — |
cors Version ^2.5.2 | — | — |
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant