Vulnerability Database
Blog
FAQ
Docs
arrow_forward
search
light_mode
dark_mode
Vulnerabilities
search
All ecosystems
659509
AlmaLinux
4796
Alpaquita
9617
Alpine
4135
Android
3266
Azure Linux
12016
BellSoft Hardened Containers
467
Bitnami
7872
Chainguard
6384
CleanStart
1122
CRAN
14
crates.io
2403
Debian
56228
Echo
4067
GHC
3
GIT
81570
GitHub Actions
52
Go
6959
Hackage
31
Hex
101
Julia
845
Linux
15361
Mageia
5922
Maven
6488
MinimOS
41448
npm
218746
NuGet
1707
opam
14
openEuler
6841
openSUSE
12811
OSS-Fuzz
3884
Packagist
6286
Pub
11
PyPI
19658
Red Hat
20130
Rocky Linux
3135
Root
14085
RubyGems
1963
SUSE
20561
SwiftURL
51
Ubuntu
54342
VSCode
18
Wolfi
4099
ID
Packages
Summary
Published
arrow_upward
Attributes
PYSEC-2026-161
PyPI/starlette
Missing Host header validation poisons request.url.path, bypassing path-based security checks
3 hours ago
Fix available
MAL-2026-4253
PyPI/pylogft
Malicious code in pylogft (PyPI)
9 hours ago
No fix available
MAL-2026-4231
PyPI/pylogfmt
Malicious code in pylogfmt (PyPI)
15 hours ago
No fix available
GHSA-f396-4rp4-7v2j
Go/github.com/boxlite-ai/boxlite/sdks/go
PyPI/boxlite
crates.io/boxlite
crates.io/boxlite-cli
npm/@boxlite-ai/boxlite
Boxlite: Path Traversal Vulnerability Leads to Arbitrary File Write on the Host
18 hours ago
Fix available
Severity - 9.6 (Critical)
GHSA-g6ww-w5j2-r7x3
Go/github.com/boxlite-ai/boxlite/sdks/go
PyPI/boxlite
crates.io/boxlite
crates.io/boxlite-cli
npm/@boxlite-ai/boxlite
BoxLite: Permission Bypass Allows Modification of Read-Only Files
18 hours ago
Fix available
Severity - 10.0 (Critical)
GHSA-cqp8-fcvh-x7r3
PyPI/pydantic-ai
PyPI/pydantic-ai-slim
Pydantic AI: SSRF cloud-metadata blocklist bypass via IPv4-mapped IPv6 (Incomplete fix of CVE-2026-25580)
19 hours ago
Fix available
Severity - 6.8 (Medium)
GHSA-54mc-gghv-4cfj
PyPI/sqladmin
SQLAdmin: Authorization Bypass on
`
ajax_lookup
`
19 hours ago
Fix available
Severity - 4.3 (Medium)
GHSA-xq32-9g7q-7297
PyPI/flaskbb
FlaskBB: SSRF in get_image_info() via unrestricted avatar URL
19 hours ago
No fix available
Severity - 6.5 (Medium)
GHSA-8rp3-xc6w-5qp5
PyPI/pyload-ng
pyload-ng: SSRF via HTTP Redirect Bypass in parse_urls API
20 hours ago
Fix available
Severity - 5.0 (Medium)
GHSA-9xq9-36w5-q796
PyPI/lmdeploy
lmdeploy: Hardcoded trust_remote_code=True is an implicit unsafe remote-code load path with no user opt-out
21 hours ago
No fix available
Severity - 7.8 (High)
GHSA-3r75-xc34-5f44
PyPI/crawlee
Crawlee for Python: SSRF via sitemap-derived URLs
21 hours ago
Fix available
Severity - 2.3 (Low)
GHSA-rq6v-x3j8-7qgf
PyPI/sagemaker
Amazon SageMaker Python SDK is missing integrity verification in its Triton inference handler
22 hours ago
Fix available
Severity - 6.4 (Medium)
GHSA-7hh5-prp2-mfh5
PyPI/sagemaker
Cleartext storage of HMAC signing key in Amazon SageMaker Python SDK ModelBuilder/Serve path
22 hours ago
Fix available
Severity - 8.5 (High)
GHSA-m549-qq94-fvhg
PyPI/lmdeploy
LMDeploy: Arbitrary code execution via hardcoded trust_remote_code=True in lmdeploy model initialization
23 hours ago
Fix available
Severity - 7.8 (High)
GHSA-5h3g-px23-w6vw
PyPI/mvt
Mobile Verification Toolkit (MVT): Path Traversal via unsanitized File identifiers in iOS Backup processing
23 hours ago
Fix available
Severity - 5.3 (Medium)
GHSA-vrxg-gm77-7q5g
PyPI/windows-mcp
Windows-MCP: HTTP transports expose unauthenticated PowerShell control with wildcard CORS
23 hours ago
Fix available
Severity - 8.9 (High)
Load more...
PyPI - OSV