Browse and filter security vulnerabilities across ecosystems
Browse and filter security vulnerabilities across ecosystems
CVE-2026-28407
malcontent: Nested archive extraction failure can drop content from scan inputs
CVE-2026-28280
osctrl has Stored Cross-Site Scripting (XSS) in On-Demand Query List
CVE-2026-28279
osctrl is Vulnerable to OS Command Injection via Environment Configuration
CVE-2026-28268
Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse
CVE-2026-27945
ZITADEL has potential SSRF via Actions
CVE-2026-27946
ZITADEL Users Can Self-Verify Email/Phone via UpdateHumanUser API
CVE-2026-27840
ZITADEL's truncated opaque tokens are still valid
CVE-2026-27734
Beszel: Docker API has a Path Traversal Vulnerability via Unsanitized Container ID
CVE-2026-27969
Vitess users with backup storage access can write to arbitrary file paths on restore
CVE-2026-27965
Vitess users with backup storage access can gain unauthorized access to production deployment environments
CVE-2026-22728
Sealed Secrets for Kubernetes: Rotate API Allows Scope Widening from Strict/Namespace-Wide to Cluster-Wide via Untrusted Template Annotations
Curio exposes database credentials to users with network access through verbose HTTP error responses
CVE-2026-27899
WireGuard Portal is Vulnerable to Privilege Escalation via User Self-Update to Admin Level
CVE-2026-27896
MCP Go SDK Vulnerable to Improper Handling of Case Sensitivity
CVE-2026-27900
Terraform Provider for Linode Debug Logs Vulnerable to Sensitive Information Exposure
CVE-2026-27465
Fleet: Sensitive Google Calendar credentials disclosed to low-privileged users
CVE-2026-25963
Fleet: Authorization Bypass in certificate template batch deletion for team administrators
CVE-2026-24004
Fleet: Unauthenticated Android device disenrollment vulnerability via Pub/Sub endpoint
CVE-2026-23999
Fleet: Device lock PIN can be predicted if lock time is known
CVE-2026-27819
Vikunja has Path Traversal in CLI Restore
Showing 1 - 20 of 1,000+ results