Vulnerabilities

ID
Packages
Summary
Published
arrow_upward
Attributes
BIT-python-min-2026-4519
  • Bitnami/python-min
webbrowser.open() allows leading dashes in URLs 5 hours ago
  • Fix available
  • Severity - 7.0 (High)
BIT-python-2026-4519
  • Bitnami/python
webbrowser.open() allows leading dashes in URLs 5 hours ago
  • Fix available
  • Severity - 7.0 (High)
BIT-mysql-client-2026-32710
  • Bitnami/mysql-client
Heap-based Buffer Overflow in MariaDB 5 hours ago
  • Fix available
  • Severity - 8.5 (High)
BIT-mariadb-min-2026-32710
  • Bitnami/mariadb-min
Heap-based Buffer Overflow in MariaDB 5 hours ago
  • Fix available
  • Severity - 8.5 (High)
BIT-mariadb-2026-32710
  • Bitnami/mariadb
Heap-based Buffer Overflow in MariaDB 5 hours ago
  • Fix available
  • Severity - 8.5 (High)
BIT-libpython-2026-4519
  • Bitnami/libpython
webbrowser.open() allows leading dashes in URLs 5 hours ago
  • Fix available
  • Severity - 7.0 (High)
BIT-tomcat-2023-28709
  • Bitnami/tomcat
Apache Tomcat: Fix for CVE-2023-24998 is incomplete yesterday
  • No fix available
  • Severity - 7.5 (High)
BIT-tomcat-2023-28708
  • Bitnami/tomcat
Apache Tomcat: JSESSIONID Cookie missing secure attribute in some configurations yesterday
  • Fix available
  • Severity - 4.3 (Medium)
BIT-mlflow-2025-15031
  • Bitnami/mlflow
Path Traversal Vulnerability in mlflow/mlflow yesterday
  • No fix available
  • Severity - 9.1 (Critical)
BIT-nginx-ingress-controller-2026-4342
  • Bitnami/nginx-ingress-controller
ingress-nginx comment-based nginx configuration injection 2 days ago
  • Fix available
  • Severity - 8.8 (High)
BIT-parse-2026-33163
  • Bitnami/parse
Parse Server leaks protected fields via LiveQuery afterEvent trigger 5 days ago
  • Fix available
  • Severity - 8.2 (High)
BIT-parse-2026-33042
  • Bitnami/parse
Parse Server affected by empty authData bypassing credential requirement on signup 5 days ago
  • Fix available
  • Severity - 6.9 (Medium)
BIT-parse-2026-32944
  • Bitnami/parse
Parse Server crash via deeply nested query condition operators 5 days ago
  • Fix available
  • Severity - 8.7 (High)
BIT-parse-2026-32943
  • Bitnami/parse
Parse Server has a password reset token single-use bypass via concurrent requests 5 days ago
  • Fix available
  • Severity - 2.3 (Low)
BIT-parse-2026-32886
  • Bitnami/parse
Parse Server's Cloud function dispatch crashes server via prototype chain traversal 5 days ago
  • Fix available
  • Severity - 8.2 (High)
BIT-parse-2026-32878
  • Bitnami/parse
Parse Server vulnerable to schema poisoning via prototype pollution in deep copy 5 days ago
  • Fix available
  • Severity - 5.3 (Medium)