Browse and filter security vulnerabilities across ecosystems
Browse and filter security vulnerabilities across ecosystems
gitoxide: Symlink prefix-reuse allows worktree escape during checkout
vm2: NodeVM require.root bypass via symlink traversal allows sandbox escape
Claude Desktop: Local Privilege Escalation via Directory Junction in CoworkVMService
ciguard: discover_pipeline_files follows symlinks out of scan root
Nomad's exec2 task driver vulnerable to arbitrary file read/write on client host through symlink attack
Nomad vulnerable to arbitrary file read/write on client host through symlink attack
Visual Studio Code Security Feature Bypass Vulnerability
JunoClaw: upload_wasm accepted arbitrary filesystem paths without validation
Consul-template vulnerable to sandbox path bypass in file helper via a symlink attack
CyberPanel 2.1 Authenticated Remote Code Execution via Symlink Attack
apko dirFS has a symlink-following path traversal that allows multiple entry points to escape the build root
PraisonAI: Symlink-extraction bypass of `_safe_extractall` writes outside `dest_dir`
IObit Advanced SystemCare Service ASC.exe symlink
In JetBrains IntelliJ IDEA before 2024
Dell/Alienware Purchased Apps, versions prior to 1
NousResearch hermes-agent file_tools.py _check_sensitive_path symlink
Improper Authentication in TUBITAK BILGEM's Pardus About
OpenClaw < 2026.3.31 - Sandbox Escape via Unrestricted File Sync and Symlink Traversal
When an application is configured to use `ApplicationPidFileWriter`, a local attacker with write access to the PID file's location can corrupt one ...
OpenClaw < 2026.3.31 - Arbitrary File Write via Symlink Following in SSH Sandbox Tar Upload
Showing 1 - 20 of 1,000+ results