Browse and filter security vulnerabilities across ecosystems
Browse and filter security vulnerabilities across ecosystems
Forgejo before 13
NVIDIA Resiliency Extension for Linux contains a vulnerability in log aggregation, where an attacker could cause predictable log-file names
Ugreen DH2100+ USB symlink
Static Web Server is vulnerable to symbolic link Path Traversal
WebPros Plesk before 18
Apptainer ineffective application of selinux and apparmor --security options
Singluarity ineffectively applies of selinux / apparmor LSM process labels
Open OnDemand allowlist bypass using symlinks in directory downloads (TOCTOU)
runc: LSM labels can be bypassed with malicious config using dummy procfs files
container escape due to /dev/console mount and related races
runc container escape via "masked path" abuse due to mount race conditions
youki container escape and denial of service due to arbitrary write gadgets and procfs write redirects
youki container escape via "masked path" abuse due to mount race conditions
SupportAssist for Home PCs versions 4
wonderwhy-er DesktopCommanderMCP filesystem.ts isPathAllowed symlink
Claude Code: Permission deny bypass is possible through symlink
SUSE-specific logrotate configuration allows escalation from mail user/group to root
tar-fs has a symlink validation bypass if destination directory is predictable with a specific tarball
astral-tokio-tar has a path traversal in tar extraction
Symlink Following in txtai leads to arbitrary file write when loading untrusted embedding indices
Showing 1 - 20 of 1,000+ results