Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2026-44475 |
|
Vulnerability in github.com/ellanetworks/core (CVE-2026-44475)
vulnerability in github.com/ellanetworks/core (CVE-2026-44475). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.10.0` or later.
|
| CVE-2026-44473 |
|
Vulnerability in github.com/ellanetworks/core (CVE-2026-44473)
vulnerability in github.com/ellanetworks/core (CVE-2026-44473). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `1.10.0` or later.
|
| ROOT-APP-MAVEN-CVE-2025-48989 |
|
Vulnerability in io.root.org.apache.tomcat:tomcat-coyote (ROOT-APP-MAVEN-CVE-2025-48989)
vulnerability in io.root.org.apache.tomcat:tomcat-coyote (ROOT-APP-MAVEN-CVE-2025-48989). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `10.1.13-root.io.1, 10.1.13-root.io.2, 10.1.13-root.io.3, 10.1.13-root.io.9, 10.1.39-root.io.5, 10.1.39-root.io.6, 10.1.39-root.io.7, 10.1.39-root.io.8, 10.1.39-root.io.9, 10.1.39-root.io.10, 10.1.13-root.io.11, 10.1.39-root.io.11, 10.1.39-root.io.12` or later.
|
| ROOT-APP-MAVEN-CVE-2025-46701 |
|
Vulnerability in io.root.org.apache.tomcat:tomcat-catalina (ROOT-APP-MAVEN-CVE-2025-46701)
vulnerability in io.root.org.apache.tomcat:tomcat-catalina (ROOT-APP-MAVEN-CVE-2025-46701). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `11.0.6-root.io.3, 11.0.6-root.io.4, 10.1.39-root.io.10, 10.1.39-root.io.11, 10.1.39-root.io.12` or later.
|
| ROOT-APP-MAVEN-CVE-2025-49124 |
|
Vulnerability in io.root.org.apache.tomcat:tomcat-catalina (ROOT-APP-MAVEN-CVE-2025-49124)
vulnerability in io.root.org.apache.tomcat:tomcat-catalina (ROOT-APP-MAVEN-CVE-2025-49124). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `10.1.13-root.io.6, 10.1.13-root.io.7, 10.1.13-root.io.8, 10.1.13-root.io.9, 10.1.13-root.io.10, 10.1.39-root.io.3, 10.1.39-root.io.4, 10.1.39-root.io.5, 10.1.39-root.io.6, 10.1.39-root.io.7, 10.1.39-root.io.8, 10.1.39-root.io.9, 10.1.39-root.io.10, 10.1.13-root.io.11, 10.1.39-root.io.11, 10.1.39-root.io.12` or later.
|
| ROOT-APP-MAVEN-CVE-2026-29145 |
|
Vulnerability in io.root.org.apache.tomcat:tomcat-catalina (ROOT-APP-MAVEN-CVE-2026-29145)
vulnerability in io.root.org.apache.tomcat:tomcat-catalina (ROOT-APP-MAVEN-CVE-2026-29145). Confidential information can be exposed externally. Mitigation: upgrade to `11.0.11-root.io.3, 10.1.39-root.io.5, 10.1.39-root.io.6, 10.1.39-root.io.7, 10.1.39-root.io.8, 10.1.39-root.io.9, 10.1.39-root.io.10, 10.1.39-root.io.11, 10.1.39-root.io.12` or later.
|
| ROOT-APP-MAVEN-CVE-2025-31650 |
|
Vulnerability in io.root.org.apache.tomcat.embed:tomcat-embed-core (ROOT-APP-MAVEN-CVE-2025-31650)
vulnerability in io.root.org.apache.tomcat.embed:tomcat-embed-core (ROOT-APP-MAVEN-CVE-2025-31650). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `10.1.39-root.io.5, 10.1.39-root.io.6, 10.1.39-root.io.7, 10.1.39-root.io.8, 10.1.39-root.io.9, 10.1.39-root.io.10, 10.1.39-root.io.11, 10.1.39-root.io.12` or later.
|
| ROOT-APP-MAVEN-CVE-2026-24880 |
|
Vulnerability in io.root.org.apache.tomcat.embed:tomcat-embed-core (ROOT-APP-MAVEN-CVE-2026-24880)
vulnerability in io.root.org.apache.tomcat.embed:tomcat-embed-core (ROOT-APP-MAVEN-CVE-2026-24880). Data can be tampered with by attackers. Mitigation: upgrade to `10.1.39-root.io.1, 10.1.39-root.io.2, 10.1.39-root.io.3, 10.1.39-root.io.4, 10.1.39-root.io.5, 10.1.39-root.io.6, 10.1.39-root.io.7, 10.1.39-root.io.8, 10.1.39-root.io.9, 10.1.39-root.io.10, 10.1.39-root.io.11, 10.1.39-root.io.12` or later.
|
| ROOT-APP-MAVEN-CVE-2025-31651 |
|
Vulnerability in io.root.org.apache.tomcat:tomcat-catalina (ROOT-APP-MAVEN-CVE-2025-31651)
vulnerability in io.root.org.apache.tomcat:tomcat-catalina (ROOT-APP-MAVEN-CVE-2025-31651). Successful exploitation can lead to full system takeover. Mitigation: upgrade to `10.1.13-root.io.3, 10.1.13-root.io.4, 10.1.13-root.io.5, 10.1.13-root.io.6, 10.1.13-root.io.7, 10.1.13-root.io.8, 10.1.13-root.io.9, 10.1.13-root.io.10, 10.1.39-root.io.5, 10.1.39-root.io.6, 10.1.39-root.io.7, 10.1.39-root.io.8, 10.1.39-root.io.9, 10.1.39-root.io.10, 10.1.13-root.io.11, 10.1.39-root.io.11, 10.1.39-root.io.12` or later.
|
| ROOT-APP-MAVEN-CVE-2025-53506 |
|
Vulnerability in io.root.org.apache.tomcat.embed:tomcat-embed-core (ROOT-APP-MAVEN-CVE-2025-53506)
vulnerability in io.root.org.apache.tomcat.embed:tomcat-embed-core (ROOT-APP-MAVEN-CVE-2025-53506). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `10.1.39-root.io.10, 10.1.39-root.io.11, 10.1.39-root.io.12` or later.
|
| ROOT-APP-MAVEN-CVE-2026-24734 |
|
Vulnerability in io.root.org.apache.tomcat.embed:tomcat-embed-core (ROOT-APP-MAVEN-CVE-2026-24734)
vulnerability in io.root.org.apache.tomcat.embed:tomcat-embed-core (ROOT-APP-MAVEN-CVE-2026-24734). Data can be tampered with by attackers. Mitigation: upgrade to `10.1.39-root.io.4, 10.1.39-root.io.5, 10.1.39-root.io.6, 10.1.39-root.io.7, 10.1.39-root.io.8, 10.1.39-root.io.9, 10.1.39-root.io.10, 10.1.39-root.io.11, 10.1.39-root.io.12` or later.
|
| ROOT-APP-MAVEN-CVE-2025-48988 |
|
Vulnerability in io.root.org.apache.tomcat:tomcat-catalina (ROOT-APP-MAVEN-CVE-2025-48988)
vulnerability in io.root.org.apache.tomcat:tomcat-catalina (ROOT-APP-MAVEN-CVE-2025-48988). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `10.1.13-root.io.9, 10.1.13-root.io.10, 11.0.6-root.io.4, 10.1.39-root.io.9, 10.1.39-root.io.10, 10.1.13-root.io.11, 10.1.39-root.io.11, 10.1.39-root.io.12` or later.
|
| ROOT-APP-MAVEN-CVE-2025-61795 |
|
Vulnerability in io.root.org.apache.tomcat:tomcat-catalina (ROOT-APP-MAVEN-CVE-2025-61795)
vulnerability in io.root.org.apache.tomcat:tomcat-catalina (ROOT-APP-MAVEN-CVE-2025-61795). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `11.0.11-root.io.1, 11.0.10-root.io.1, 11.0.7-root.io.1, 11.0.6-root.io.1, 11.0.8-root.io.1, 10.1.13-root.io.5, 11.0.6-root.io.2, 11.0.11-root.io.2, 10.1.13-root.io.6, 10.1.13-root.io.7, 10.1.13-root.io.8, 11.0.7-root.io.2, 11.0.6-root.io.3, 11.0.10-root.io.2, 11.0.8-root.io.2, 10.1.13-root.io.9, 10.1.13-root.io.10, 11.0.9-root.io.1, 11.0.9-root.io.2, 11.0.6-root.io.4, 11.0.11-root.io.3, 10.1.39-root.io.6, 10.1.39-root.io.7, 10.1.39-root.io.8, 10.1.39-root.io.9, 10.1.39-root.io.10, 10.1.13-root.io.11, 10.1.39-root.io.11, 10.1.39-root.io.12` or later.
|
| ROOT-APP-MAVEN-CVE-2026-25854 |
|
Vulnerability in io.root.org.apache.tomcat.embed:tomcat-embed-core (ROOT-APP-MAVEN-CVE-2026-25854)
vulnerability in io.root.org.apache.tomcat.embed:tomcat-embed-core (ROOT-APP-MAVEN-CVE-2026-25854). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `10.1.39-root.io.8, 10.1.39-root.io.9, 10.1.39-root.io.10, 10.1.39-root.io.11, 10.1.39-root.io.12` or later.
|
| ROOT-APP-MAVEN-CVE-2025-66614 |
|
Vulnerability in io.root.org.apache.tomcat:tomcat-catalina (ROOT-APP-MAVEN-CVE-2025-66614)
vulnerability in io.root.org.apache.tomcat:tomcat-catalina (ROOT-APP-MAVEN-CVE-2025-66614). Confidential information can be exposed externally. Mitigation: upgrade to `11.0.6-root.io.2, 11.0.11-root.io.2, 11.0.7-root.io.2, 11.0.6-root.io.3, 11.0.10-root.io.2, 11.0.8-root.io.2, 11.0.6-root.io.4, 11.0.11-root.io.3, 10.1.39-root.io.2, 10.1.39-root.io.3, 10.1.39-root.io.4, 10.1.39-root.io.5, 10.1.39-root.io.6, 10.1.39-root.io.7, 10.1.39-root.io.8, 10.1.39-root.io.9, 10.1.39-root.io.10, 10.1.39-root.io.11, 10.1.39-root.io.12` or later.
|
| USN-8266-1 |
|
Vulnerability in linux-aws-hwe (USN-8266-1)
vulnerability in linux-aws-hwe (USN-8266-1). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `4.15.0-1191.204~16.04.1` or later.
|
| CVE-2026-45017 |
|
Path Traversal in python-liquid (CVE-2026-45017)
path traversal in python-liquid (CVE-2026-45017). Risk of unauthorized operations or information disclosure. Exploitable via ``FileSystemLoader``. Mitigation: upgrade to `2.2.0` or later.
|
| GHSA-88q9-cmp2-c2vq |
|
Vulnerability in oxidize-pdf (GHSA-88q9-cmp2-c2vq)
vulnerability in oxidize-pdf (GHSA-88q9-cmp2-c2vq). Risk of unauthorized operations or information disclosure. Exploitable via ``Color``. Mitigation: upgrade to `2.6.0` or later.
|
| CVE-2026-44432 |
|
Vulnerability in urllib3 (CVE-2026-44432)
vulnerability in urllib3 (CVE-2026-44432). Risk of unauthorized operations or information disclosure. Exploitable via ``gzip``. Mitigation: upgrade to `2.7.0` or later.
|
| CVE-2026-44431 |
|
Information Disclosure in urllib3 (CVE-2026-44431)
vulnerability in urllib3 (CVE-2026-44431). Risk of unauthorized operations or information disclosure. Exploitable via ``Authorization``. Mitigation: upgrade to `2.7.0` or later.
|
| GHSA-w94c-4vhp-22gx |
|
Vulnerability in @vitejs/plugin-rsc (GHSA-w94c-4vhp-22gx)
vulnerability in @vitejs/plugin-rsc (GHSA-w94c-4vhp-22gx). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `0.5.26` or later.
|
| GHSA-8h8q-6873-q5fj |
|
Vulnerability in next (GHSA-8h8q-6873-q5fj)
vulnerability in next (GHSA-8h8q-6873-q5fj). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `16.2.5` or later.
|
| CVE-2026-23870 |
|
Vulnerability in react-server-dom-parcel (CVE-2026-23870)
vulnerability in react-server-dom-parcel (CVE-2026-23870). Risk of unauthorized operations or information disclosure. Mitigation: upgrade to `19.2.6` or later.
|
| CVE-2026-45022 |
|
Vulnerability in github.com/go-git/go-git/v6 (CVE-2026-45022)
vulnerability in github.com/go-git/go-git/v6 (CVE-2026-45022). Risk of unauthorized operations or information disclosure. Exploitable via ``commit``. Mitigation: upgrade to `6.0.0-alpha.3` or later.
|
| CVE-2026-44971 |
|
SSRF (Server-Side Request Forgery) in guarddog (CVE-2026-44971)
SSRF in guarddog (CVE-2026-44971). Confidential information can be exposed externally. Exploitable via ``GH_TOKEN``.
|
| CVE-2026-44972 |
|
Vulnerability in guarddog (CVE-2026-44972)
vulnerability in guarddog (CVE-2026-44972). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-6420 |
|
Vulnerability in keylime (CVE-2026-6420)
vulnerability in keylime (CVE-2026-6420). Confidential information can be exposed externally. Exploitable via ``tpm2_quote``. Mitigation: upgrade to `7.14.2` or later.
|
| CVE-2026-44902 |
|
Vulnerability in @opentelemetry/exporter-prometheus (CVE-2026-44902)
vulnerability in @opentelemetry/exporter-prometheus (CVE-2026-44902). Risk of unauthorized operations or information disclosure. Exploitable via ``TypeError``. Mitigation: upgrade to `0.217.0` or later.
|
| GHSA-g588-cjg3-6g78 |
|
Vulnerability in steamworks (GHSA-g588-cjg3-6g78)
vulnerability in steamworks (GHSA-g588-cjg3-6g78). Risk of unauthorized operations or information disclosure. Exploitable via ``ValidateAuthTicketResponse_t``. Mitigation: upgrade to `0.13.1` or later.
|
| CVE-2026-44353 |
|
Vulnerability in streamlink (CVE-2026-44353)
vulnerability in streamlink (CVE-2026-44353). Confidential information can be exposed externally. Exploitable via ``playlist.m3u8``. Mitigation: upgrade to `8.4.0` or later.
|
| CVE-2026-44346 |
|
OS Command Injection in bentoml (CVE-2026-44346)
OS command injection in bentoml (CVE-2026-44346). Successful exploitation can lead to full system takeover. Exploitable via ``bentofile.yaml``. Mitigation: upgrade to `1.4.39` or later.
|
| CVE-2026-44345 |
|
OS Command Injection in bentoml (CVE-2026-44345)
OS command injection in bentoml (CVE-2026-44345). Successful exploitation can lead to full system takeover. Exploitable via ``docker.base_image``. Mitigation: upgrade to `1.4.39` or later.
|
| CVE-2026-44570 |
|
Vulnerability in open-webui (CVE-2026-44570)
vulnerability in open-webui (CVE-2026-44570). Confidential information can be exposed externally. Exploitable via `POST /api/v1/memories/query`. Mitigation: upgrade to `0.6.19` or later.
|
| CVE-2026-8290 |
|
Vulnerability in c (CVE-2026-8290)
vulnerability in c (CVE-2026-8290). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-8289 |
|
Vulnerability in c (CVE-2026-8289)
vulnerability in c (CVE-2026-8289). Risk of unauthorized operations or information disclosure.
|
| CVE-2026-4802 |
|
OS Command Injection in CVE-2026-4802 (CVE-2026-4802)
OS command injection in CVE-2026-4802 (CVE-2026-4802). Successful exploitation can lead to full system takeover.
|
| MINI-83fh-vcmc-8x2h |
|
MINI-83fh-vcmc-8x2h |
| MINI-849p-6hp7-5x6q |
|
MINI-849p-6hp7-5x6q |
| MINI-36jf-6p3v-rrq3 |
|
MINI-36jf-6p3v-rrq3 |
| CVE-2026-44985 |
|
Vulnerability in github.com/amir20/dozzle (CVE-2026-44985)
vulnerability in github.com/amir20/dozzle (CVE-2026-44985). Risk of unauthorized operations or information disclosure. Exploitable via ``true``.
|
| MINI-m34h-xjqg-4hc5 |
|
MINI-m34h-xjqg-4hc5 |
| MINI-j355-qcp8-2f4m |
|
MINI-j355-qcp8-2f4m |
| MINI-hrh9-gjf3-66rj |
|
MINI-hrh9-gjf3-66rj |
| MINI-hj93-mqxr-g8qw |
|
MINI-hj93-mqxr-g8qw |
| MINI-gp2f-3x6m-672p |
|
MINI-gp2f-3x6m-672p |
| MINI-g9j2-p2ff-c69x |
|
MINI-g9j2-p2ff-c69x |
| MINI-fvq5-5fpr-5m4c |
|
MINI-fvq5-5fpr-5m4c |
| MINI-fw3j-ccf6-95f6 |
|
MINI-fw3j-ccf6-95f6 |
| MINI-g44g-66qr-c9rr |
|
MINI-g44g-66qr-c9rr |
| MINI-9p4x-rxh5-4w9j |
|
MINI-9p4x-rxh5-4w9j |