Putki Security Vulnerability Scans
Last Updated: 19 Apr 2026 00:47:45
Quick Navigation
↑Development
Severity Breakdown
| Severity | Count |
|---|---|
| HIGH | 15 |
| MEDIUM | 25 |
| LOW | 3 |
Details for version: Development
CVE Details for Version: Development
| Severity | Score | CVE ID | Description |
|---|---|---|---|
| HIGH | 8.8 | CVE-2025-69194 | CVE-2025-69194 |
| HIGH | 8.7 | CVE-2026-33871 | CVE-2026-33871: Allocation of Resources Without Limits or Throttling |
| HIGH | 8.2 | CVE-2026-26740 | CVE-2026-26740 |
| HIGH | 8.1 | CVE-2026-40200 | CVE-2026-40200 |
| HIGH | 7.6 | CVE-2026-33636 | CVE-2026-33636 |
| HIGH | 7.5 | CVE-2022-41404 | CVE-2022-41404: Uncontrolled Resource Consumption |
| HIGH | 7.5 | CVE-2026-2673 | CVE-2026-2673 |
| HIGH | 7.5 | CVE-2026-27135 | CVE-2026-27135 |
| HIGH | 7.5 | CVE-2026-28388 | CVE-2026-28388 |
| HIGH | 7.5 | CVE-2026-28389 | CVE-2026-28389 |
| HIGH | 7.5 | CVE-2026-28390 | CVE-2026-28390 |
| HIGH | 7.5 | CVE-2026-31790 | CVE-2026-31790 |
| HIGH | 7.5 | CVE-2026-33416 | CVE-2026-33416 |
| HIGH | 7.5 | CVE-2026-33870 | CVE-2026-33870: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') |
| HIGH | 7.5 | CVE-2026-3805 | CVE-2026-3805 |
| MEDIUM | 6.9 | CVE-2026-34478 | CVE-2026-34478: Improper Output Neutralization for Logs |
| MEDIUM | 6.9 | CVE-2026-34480 | CVE-2026-34480: Improper Encoding or Escaping of Output |
| MEDIUM | 6.9 | GHSA-72hv-8253-57qq | GHSA-72hv-8253-57qq: Allocation of Resources Without Limits or Throttling |
| MEDIUM | 6.5 | CVE-2016-5004 | CVE-2016-5004: Uncontrolled Resource Consumption |
| MEDIUM | 6.5 | CVE-2024-45993 | CVE-2024-45993 |
| MEDIUM | 6.5 | CVE-2025-48924 | CVE-2025-48924: Uncontrolled Recursion |
| MEDIUM | 6.5 | CVE-2025-60876 | CVE-2025-60876 |
| MEDIUM | 6.5 | CVE-2026-1965 | CVE-2026-1965 |
| MEDIUM | 6.5 | CVE-2026-3784 | CVE-2026-3784 |
| MEDIUM | 6.3 | CVE-2025-14017 | CVE-2025-14017 |
| MEDIUM | 6.3 | CVE-2025-8916 | CVE-2025-8916: Allocation of Resources Without Limits or Throttling |
| MEDIUM | 6.3 | CVE-2026-34477 | CVE-2026-34477: Improper Validation of Certificate with Host Mismatch |
| MEDIUM | 6.3 | CVE-2026-5588 | CVE-2026-5588: Use of a Broken or Risky Cryptographic Algorithm |
| MEDIUM | 5.9 | CVE-2025-13034 | CVE-2025-13034 |
| MEDIUM | 5.9 | CVE-2026-28208 | CVE-2026-28208: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
| MEDIUM | 5.9 | GHSA-hf5p-q87m-crj7 | GHSA-hf5p-q87m-crj7: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
| MEDIUM | 5.7 | CVE-2025-46551 | CVE-2025-46551: Improper Certificate Validation |
| MEDIUM | 5.5 | CVE-2026-0636 | CVE-2026-0636: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') |
| MEDIUM | 5.3 | CVE-2025-14524 | CVE-2025-14524 |
| MEDIUM | 5.3 | CVE-2025-14819 | CVE-2025-14819 |
| MEDIUM | 5.3 | CVE-2025-15079 | CVE-2025-15079 |
| MEDIUM | 5.3 | CVE-2026-3783 | CVE-2026-3783 |
| MEDIUM | 5.1 | CVE-2026-34757 | CVE-2026-34757 |
| MEDIUM | 4.8 | CVE-2026-6042 | CVE-2026-6042 |
| MEDIUM | 4.6 | CVE-2026-22184 | CVE-2026-22184 |
| LOW | 3.1 | CVE-2025-15224 | CVE-2025-15224 |
| LOW | 2.9 | CVE-2026-27171 | CVE-2026-27171 |
| LOW | 1.9 | CVE-2026-3293 | CVE-2026-3293: Uncontrolled Resource Consumption |
↑2026.03
Severity Breakdown
| Severity | Count |
|---|---|
| HIGH | 18 |
| MEDIUM | 25 |
| LOW | 4 |
Details for version: 2026.03
CVE Details for Version: 2026.03
| Severity | Score | CVE ID | Description |
|---|---|---|---|
| HIGH | 8.8 | CVE-2025-69194 | CVE-2025-69194 |
| HIGH | 8.7 | CVE-2026-33871 | CVE-2026-33871: Allocation of Resources Without Limits or Throttling |
| HIGH | 8.7 | CVE-2026-35554 | CVE-2026-35554: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') |
| HIGH | 8.2 | CVE-2026-26740 | CVE-2026-26740 |
| HIGH | 8.1 | CVE-2026-40200 | CVE-2026-40200 |
| HIGH | 7.6 | CVE-2026-33636 | CVE-2026-33636 |
| HIGH | 7.5 | CVE-2022-41404 | CVE-2022-41404: Uncontrolled Resource Consumption |
| HIGH | 7.5 | CVE-2026-1605 | CVE-2026-1605: Uncontrolled Resource Consumption |
| HIGH | 7.5 | CVE-2026-2673 | CVE-2026-2673 |
| HIGH | 7.5 | CVE-2026-27135 | CVE-2026-27135 |
| HIGH | 7.5 | CVE-2026-28388 | CVE-2026-28388 |
| HIGH | 7.5 | CVE-2026-28389 | CVE-2026-28389 |
| HIGH | 7.5 | CVE-2026-28390 | CVE-2026-28390 |
| HIGH | 7.5 | CVE-2026-31790 | CVE-2026-31790 |
| HIGH | 7.5 | CVE-2026-33416 | CVE-2026-33416 |
| HIGH | 7.5 | CVE-2026-33870 | CVE-2026-33870: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') |
| HIGH | 7.5 | CVE-2026-3805 | CVE-2026-3805 |
| HIGH | 7.4 | CVE-2026-2332 | CVE-2026-2332: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') |
| MEDIUM | 6.9 | CVE-2026-34478 | CVE-2026-34478: Improper Output Neutralization for Logs |
| MEDIUM | 6.9 | CVE-2026-34480 | CVE-2026-34480: Improper Encoding or Escaping of Output |
| MEDIUM | 6.9 | GHSA-72hv-8253-57qq | GHSA-72hv-8253-57qq: Allocation of Resources Without Limits or Throttling |
| MEDIUM | 6.5 | CVE-2016-5004 | CVE-2016-5004: Uncontrolled Resource Consumption |
| MEDIUM | 6.5 | CVE-2024-45993 | CVE-2024-45993 |
| MEDIUM | 6.5 | CVE-2025-48924 | CVE-2025-48924: Uncontrolled Recursion |
| MEDIUM | 6.5 | CVE-2025-60876 | CVE-2025-60876 |
| MEDIUM | 6.5 | CVE-2026-1965 | CVE-2026-1965 |
| MEDIUM | 6.5 | CVE-2026-3784 | CVE-2026-3784 |
| MEDIUM | 6.3 | CVE-2025-14017 | CVE-2025-14017 |
| MEDIUM | 6.3 | CVE-2025-8916 | CVE-2025-8916: Allocation of Resources Without Limits or Throttling |
| MEDIUM | 6.3 | CVE-2026-34477 | CVE-2026-34477: Improper Validation of Certificate with Host Mismatch |
| MEDIUM | 6.3 | CVE-2026-5588 | CVE-2026-5588: Use of a Broken or Risky Cryptographic Algorithm |
| MEDIUM | 5.9 | CVE-2025-13034 | CVE-2025-13034 |
| MEDIUM | 5.9 | CVE-2026-28208 | CVE-2026-28208: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
| MEDIUM | 5.9 | GHSA-hf5p-q87m-crj7 | GHSA-hf5p-q87m-crj7: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
| MEDIUM | 5.7 | CVE-2025-46551 | CVE-2025-46551: Improper Certificate Validation |
| MEDIUM | 5.5 | CVE-2026-0636 | CVE-2026-0636: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') |
| MEDIUM | 5.3 | CVE-2025-14524 | CVE-2025-14524 |
| MEDIUM | 5.3 | CVE-2025-14819 | CVE-2025-14819 |
| MEDIUM | 5.3 | CVE-2025-15079 | CVE-2025-15079 |
| MEDIUM | 5.3 | CVE-2026-3783 | CVE-2026-3783 |
| MEDIUM | 5.1 | CVE-2026-34757 | CVE-2026-34757 |
| MEDIUM | 4.8 | CVE-2026-6042 | CVE-2026-6042 |
| MEDIUM | 4.6 | CVE-2026-22184 | CVE-2026-22184 |
| LOW | 3.7 | CVE-2025-11143 | CVE-2025-11143: Improper Input Validation |
| LOW | 3.1 | CVE-2025-15224 | CVE-2025-15224 |
| LOW | 2.9 | CVE-2026-27171 | CVE-2026-27171 |
| LOW | 1.9 | CVE-2026-3293 | CVE-2026-3293: Uncontrolled Resource Consumption |
↑2025.08
Severity Breakdown
| Severity | Count |
|---|---|
| HIGH | 28 |
| MEDIUM | 42 |
| LOW | 11 |
Details for version: 2025.08
CVE Details for Version: 2025.08
| Severity | Score | CVE ID | Description |
|---|---|---|---|
| HIGH | 8.8 | CVE-2025-12183 | CVE-2025-12183: Out-of-bounds Read |
| HIGH | 8.8 | CVE-2025-48734 | CVE-2025-48734: Improper Access Control |
| HIGH | 8.8 | CVE-2025-69194 | CVE-2025-69194 |
| HIGH | 8.7 | CVE-2023-52428 | CVE-2023-52428: Uncontrolled Resource Consumption |
| HIGH | 8.7 | CVE-2026-33871 | CVE-2026-33871: Allocation of Resources Without Limits or Throttling |
| HIGH | 8.7 | CVE-2026-35554 | CVE-2026-35554: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') |
| HIGH | 8.2 | CVE-2025-49146 | CVE-2025-49146: Improper Authentication |
| HIGH | 8.2 | CVE-2025-55163 | CVE-2025-55163: Allocation of Resources Without Limits or Throttling |
| HIGH | 8.2 | CVE-2025-66566 | CVE-2025-66566: Insertion of Sensitive Information Into Sent Data |
| HIGH | 8.2 | CVE-2026-26740 | CVE-2026-26740 |
| HIGH | 8.1 | CVE-2025-59250 | CVE-2025-59250: Improper Input Validation |
| HIGH | 8.1 | CVE-2026-40200 | CVE-2026-40200 |
| HIGH | 7.7 | CVE-2024-47072 | CVE-2024-47072: Stack-based Buffer Overflow |
| HIGH | 7.6 | CVE-2026-33636 | CVE-2026-33636 |
| HIGH | 7.5 | CVE-2021-31684 | CVE-2021-31684: Out-of-bounds Read |
| HIGH | 7.5 | CVE-2022-41404 | CVE-2022-41404: Uncontrolled Resource Consumption |
| HIGH | 7.5 | CVE-2023-1370 | CVE-2023-1370: Uncontrolled Recursion |
| HIGH | 7.5 | CVE-2026-2673 | CVE-2026-2673 |
| HIGH | 7.5 | CVE-2026-27135 | CVE-2026-27135 |
| HIGH | 7.5 | CVE-2026-28388 | CVE-2026-28388 |
| HIGH | 7.5 | CVE-2026-28389 | CVE-2026-28389 |
| HIGH | 7.5 | CVE-2026-28390 | CVE-2026-28390 |
| HIGH | 7.5 | CVE-2026-31790 | CVE-2026-31790 |
| HIGH | 7.5 | CVE-2026-33416 | CVE-2026-33416 |
| HIGH | 7.5 | CVE-2026-33870 | CVE-2026-33870: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') |
| HIGH | 7.5 | CVE-2026-3805 | CVE-2026-3805 |
| HIGH | 7.4 | CVE-2026-2332 | CVE-2026-2332: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') |
| HIGH | 7.2 | CVE-2024-13009 | CVE-2024-13009: Improper Resource Shutdown or Release |
| MEDIUM | 6.9 | CVE-2025-31672 | CVE-2025-31672: Improper Input Validation |
| MEDIUM | 6.9 | CVE-2025-58057 | CVE-2025-58057: Improper Handling of Highly Compressed Data (Data Amplification) |
| MEDIUM | 6.9 | CVE-2026-34478 | CVE-2026-34478: Improper Output Neutralization for Logs |
| MEDIUM | 6.9 | CVE-2026-34480 | CVE-2026-34480: Improper Encoding or Escaping of Output |
| MEDIUM | 6.9 | GHSA-72hv-8253-57qq | GHSA-72hv-8253-57qq: Allocation of Resources Without Limits or Throttling |
| MEDIUM | 6.5 | CVE-2016-5004 | CVE-2016-5004: Uncontrolled Resource Consumption |
| MEDIUM | 6.5 | CVE-2024-45993 | CVE-2024-45993 |
| MEDIUM | 6.5 | CVE-2025-48924 | CVE-2025-48924: Uncontrolled Recursion |
| MEDIUM | 6.5 | CVE-2025-60876 | CVE-2025-60876 |
| MEDIUM | 6.5 | CVE-2025-67735 | CVE-2025-67735: Improper Neutralization of CRLF Sequences ('CRLF Injection') |
| MEDIUM | 6.5 | CVE-2026-1965 | CVE-2026-1965 |
| MEDIUM | 6.5 | CVE-2026-3784 | CVE-2026-3784 |
| MEDIUM | 6.3 | CVE-2024-6763 | CVE-2024-6763: Improper Validation of Syntactic Correctness of Input |
| MEDIUM | 6.3 | CVE-2025-14017 | CVE-2025-14017 |
| MEDIUM | 6.3 | CVE-2025-68161 | CVE-2025-68161: Improper Validation of Certificate with Host Mismatch |
| MEDIUM | 6.3 | CVE-2025-8916 | CVE-2025-8916: Allocation of Resources Without Limits or Throttling |
| MEDIUM | 6.3 | CVE-2026-34477 | CVE-2026-34477: Improper Validation of Certificate with Host Mismatch |
| MEDIUM | 6.3 | CVE-2026-5588 | CVE-2026-5588: Use of a Broken or Risky Cryptographic Algorithm |
| MEDIUM | 6.2 | CVE-2025-27817 | CVE-2025-27817: Server-Side Request Forgery (SSRF) |
| MEDIUM | 6.1 | CVE-2025-22227 | CVE-2025-22227: Exposure of Sensitive Information to an Unauthorized Actor |
| MEDIUM | 6.0 | CVE-2025-7962 | CVE-2025-7962: Improper Neutralization of Input Terminators |
| MEDIUM | 5.9 | CVE-2024-8184 | CVE-2024-8184: Uncontrolled Resource Consumption |
| MEDIUM | 5.9 | CVE-2025-13034 | CVE-2025-13034 |
| MEDIUM | 5.9 | CVE-2026-28208 | CVE-2026-28208: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
| MEDIUM | 5.9 | GHSA-hf5p-q87m-crj7 | GHSA-hf5p-q87m-crj7: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
| MEDIUM | 5.8 | CVE-2025-53864 | CVE-2025-53864: Uncontrolled Recursion |
| MEDIUM | 5.7 | CVE-2025-46551 | CVE-2025-46551: Improper Certificate Validation |
| MEDIUM | 5.5 | CVE-2023-2976 | CVE-2023-2976: Creation of Temporary File in Directory with Insecure Permissions |
| MEDIUM | 5.5 | CVE-2025-4949 | org.eclipse.jgit: XXE vulnerability in Eclipse JGit |
| MEDIUM | 5.5 | CVE-2026-0636 | CVE-2026-0636: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') |
| MEDIUM | 5.3 | CVE-2021-34429 | CVE-2021-34429: Exposure of Sensitive Information to an Unauthorized Actor |
| MEDIUM | 5.3 | CVE-2023-26048 | CVE-2023-26048: Uncontrolled Resource Consumption |
| MEDIUM | 5.3 | CVE-2023-40167 | CVE-2023-40167: OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| MEDIUM | 5.3 | CVE-2024-9823 | CVE-2024-9823: Uncontrolled Resource Consumption |
| MEDIUM | 5.3 | CVE-2025-14524 | CVE-2025-14524 |
| MEDIUM | 5.3 | CVE-2025-14819 | CVE-2025-14819 |
| MEDIUM | 5.3 | CVE-2025-15079 | CVE-2025-15079 |
| MEDIUM | 5.3 | CVE-2026-3783 | CVE-2026-3783 |
| MEDIUM | 5.1 | CVE-2026-34757 | CVE-2026-34757 |
| MEDIUM | 4.8 | CVE-2026-6042 | CVE-2026-6042 |
| MEDIUM | 4.6 | CVE-2026-22184 | CVE-2026-22184 |
| MEDIUM | 4.3 | CVE-2023-41900 | CVE-2023-41900: OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| LOW | 3.9 | GHSA-58qw-p7qm-5rvh | GHSA-58qw-p7qm-5rvh: Improper Restriction of XML External Entity Reference |
| LOW | 3.7 | CVE-2025-11143 | CVE-2025-11143: Improper Input Validation |
| LOW | 3.5 | CVE-2023-36479 | CVE-2023-36479: OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| LOW | 3.3 | CVE-2020-8908 | CVE-2020-8908: Improper Handling of Alternate Encoding |
| LOW | 3.1 | CVE-2025-15224 | CVE-2025-15224 |
| LOW | 3.1 | CVE-2025-58056 | CVE-2025-58056: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') |
| LOW | 2.9 | CVE-2026-27171 | CVE-2026-27171 |
| LOW | 2.7 | CVE-2022-2047 | CVE-2022-2047: Improper Input Validation |
| LOW | 2.7 | CVE-2025-66453 | CVE-2025-66453: Uncontrolled Resource Consumption |
| LOW | 2.4 | CVE-2023-26049 | CVE-2023-26049: OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| LOW | 1.9 | CVE-2026-3293 | CVE-2026-3293: Uncontrolled Resource Consumption |
↑2025.05
Severity Breakdown
| Severity | Count |
|---|---|
| HIGH | 28 |
| MEDIUM | 42 |
| LOW | 11 |
Details for version: 2025.05
CVE Details for Version: 2025.05
| Severity | Score | CVE ID | Description |
|---|---|---|---|
| HIGH | 8.8 | CVE-2025-12183 | CVE-2025-12183: Out-of-bounds Read |
| HIGH | 8.8 | CVE-2025-48734 | CVE-2025-48734: Improper Access Control |
| HIGH | 8.8 | CVE-2025-69194 | CVE-2025-69194 |
| HIGH | 8.7 | CVE-2023-52428 | CVE-2023-52428: Uncontrolled Resource Consumption |
| HIGH | 8.7 | CVE-2026-33871 | CVE-2026-33871: Allocation of Resources Without Limits or Throttling |
| HIGH | 8.7 | CVE-2026-35554 | CVE-2026-35554: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') |
| HIGH | 8.2 | CVE-2025-49146 | CVE-2025-49146: Improper Authentication |
| HIGH | 8.2 | CVE-2025-55163 | CVE-2025-55163: Allocation of Resources Without Limits or Throttling |
| HIGH | 8.2 | CVE-2025-66566 | CVE-2025-66566: Insertion of Sensitive Information Into Sent Data |
| HIGH | 8.2 | CVE-2026-26740 | CVE-2026-26740 |
| HIGH | 8.1 | CVE-2025-59250 | CVE-2025-59250: Improper Input Validation |
| HIGH | 8.1 | CVE-2026-40200 | CVE-2026-40200 |
| HIGH | 7.7 | CVE-2024-47072 | CVE-2024-47072: Stack-based Buffer Overflow |
| HIGH | 7.6 | CVE-2026-33636 | CVE-2026-33636 |
| HIGH | 7.5 | CVE-2021-31684 | CVE-2021-31684: Out-of-bounds Read |
| HIGH | 7.5 | CVE-2022-41404 | CVE-2022-41404: Uncontrolled Resource Consumption |
| HIGH | 7.5 | CVE-2023-1370 | CVE-2023-1370: Uncontrolled Recursion |
| HIGH | 7.5 | CVE-2026-2673 | CVE-2026-2673 |
| HIGH | 7.5 | CVE-2026-27135 | CVE-2026-27135 |
| HIGH | 7.5 | CVE-2026-28388 | CVE-2026-28388 |
| HIGH | 7.5 | CVE-2026-28389 | CVE-2026-28389 |
| HIGH | 7.5 | CVE-2026-28390 | CVE-2026-28390 |
| HIGH | 7.5 | CVE-2026-31790 | CVE-2026-31790 |
| HIGH | 7.5 | CVE-2026-33416 | CVE-2026-33416 |
| HIGH | 7.5 | CVE-2026-33870 | CVE-2026-33870: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') |
| HIGH | 7.5 | CVE-2026-3805 | CVE-2026-3805 |
| HIGH | 7.4 | CVE-2026-2332 | CVE-2026-2332: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') |
| HIGH | 7.2 | CVE-2024-13009 | CVE-2024-13009: Improper Resource Shutdown or Release |
| MEDIUM | 6.9 | CVE-2025-31672 | CVE-2025-31672: Improper Input Validation |
| MEDIUM | 6.9 | CVE-2025-58057 | CVE-2025-58057: Improper Handling of Highly Compressed Data (Data Amplification) |
| MEDIUM | 6.9 | CVE-2026-34478 | CVE-2026-34478: Improper Output Neutralization for Logs |
| MEDIUM | 6.9 | CVE-2026-34480 | CVE-2026-34480: Improper Encoding or Escaping of Output |
| MEDIUM | 6.9 | GHSA-72hv-8253-57qq | GHSA-72hv-8253-57qq: Allocation of Resources Without Limits or Throttling |
| MEDIUM | 6.5 | CVE-2016-5004 | CVE-2016-5004: Uncontrolled Resource Consumption |
| MEDIUM | 6.5 | CVE-2024-45993 | CVE-2024-45993 |
| MEDIUM | 6.5 | CVE-2025-48924 | CVE-2025-48924: Uncontrolled Recursion |
| MEDIUM | 6.5 | CVE-2025-60876 | CVE-2025-60876 |
| MEDIUM | 6.5 | CVE-2025-67735 | CVE-2025-67735: Improper Neutralization of CRLF Sequences ('CRLF Injection') |
| MEDIUM | 6.5 | CVE-2026-1965 | CVE-2026-1965 |
| MEDIUM | 6.5 | CVE-2026-3784 | CVE-2026-3784 |
| MEDIUM | 6.3 | CVE-2024-6763 | CVE-2024-6763: Improper Validation of Syntactic Correctness of Input |
| MEDIUM | 6.3 | CVE-2025-14017 | CVE-2025-14017 |
| MEDIUM | 6.3 | CVE-2025-68161 | CVE-2025-68161: Improper Validation of Certificate with Host Mismatch |
| MEDIUM | 6.3 | CVE-2025-8916 | CVE-2025-8916: Allocation of Resources Without Limits or Throttling |
| MEDIUM | 6.3 | CVE-2026-34477 | CVE-2026-34477: Improper Validation of Certificate with Host Mismatch |
| MEDIUM | 6.3 | CVE-2026-5588 | CVE-2026-5588: Use of a Broken or Risky Cryptographic Algorithm |
| MEDIUM | 6.2 | CVE-2025-27817 | CVE-2025-27817: Server-Side Request Forgery (SSRF) |
| MEDIUM | 6.1 | CVE-2025-22227 | CVE-2025-22227: Exposure of Sensitive Information to an Unauthorized Actor |
| MEDIUM | 6.0 | CVE-2025-7962 | CVE-2025-7962: Improper Neutralization of Input Terminators |
| MEDIUM | 5.9 | CVE-2024-8184 | CVE-2024-8184: Uncontrolled Resource Consumption |
| MEDIUM | 5.9 | CVE-2025-13034 | CVE-2025-13034 |
| MEDIUM | 5.9 | CVE-2026-28208 | CVE-2026-28208: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
| MEDIUM | 5.9 | GHSA-hf5p-q87m-crj7 | GHSA-hf5p-q87m-crj7: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
| MEDIUM | 5.8 | CVE-2025-53864 | CVE-2025-53864: Uncontrolled Recursion |
| MEDIUM | 5.7 | CVE-2025-46551 | CVE-2025-46551: Improper Certificate Validation |
| MEDIUM | 5.5 | CVE-2023-2976 | CVE-2023-2976: Creation of Temporary File in Directory with Insecure Permissions |
| MEDIUM | 5.5 | CVE-2025-4949 | org.eclipse.jgit: XXE vulnerability in Eclipse JGit |
| MEDIUM | 5.5 | CVE-2026-0636 | CVE-2026-0636: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') |
| MEDIUM | 5.3 | CVE-2021-34429 | CVE-2021-34429: Exposure of Sensitive Information to an Unauthorized Actor |
| MEDIUM | 5.3 | CVE-2023-26048 | CVE-2023-26048: Uncontrolled Resource Consumption |
| MEDIUM | 5.3 | CVE-2023-40167 | CVE-2023-40167: Improper Handling of Length Parameter Inconsistency |
| MEDIUM | 5.3 | CVE-2024-9823 | CVE-2024-9823: Uncontrolled Resource Consumption |
| MEDIUM | 5.3 | CVE-2025-14524 | CVE-2025-14524 |
| MEDIUM | 5.3 | CVE-2025-14819 | CVE-2025-14819 |
| MEDIUM | 5.3 | CVE-2025-15079 | CVE-2025-15079 |
| MEDIUM | 5.3 | CVE-2026-3783 | CVE-2026-3783 |
| MEDIUM | 5.1 | CVE-2026-34757 | CVE-2026-34757 |
| MEDIUM | 4.8 | CVE-2026-6042 | CVE-2026-6042 |
| MEDIUM | 4.6 | CVE-2026-22184 | CVE-2026-22184 |
| MEDIUM | 4.3 | CVE-2023-41900 | CVE-2023-41900: OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| LOW | 3.9 | GHSA-58qw-p7qm-5rvh | GHSA-58qw-p7qm-5rvh: Improper Restriction of XML External Entity Reference |
| LOW | 3.7 | CVE-2025-11143 | CVE-2025-11143: Improper Input Validation |
| LOW | 3.5 | CVE-2023-36479 | CVE-2023-36479: Improper Neutralization of Quoting Syntax |
| LOW | 3.3 | CVE-2020-8908 | CVE-2020-8908: Improper Handling of Alternate Encoding |
| LOW | 3.1 | CVE-2025-15224 | CVE-2025-15224 |
| LOW | 3.1 | CVE-2025-58056 | CVE-2025-58056: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') |
| LOW | 2.9 | CVE-2026-27171 | CVE-2026-27171 |
| LOW | 2.7 | CVE-2022-2047 | CVE-2022-2047: Improper Input Validation |
| LOW | 2.7 | CVE-2025-66453 | CVE-2025-66453: Uncontrolled Resource Consumption |
| LOW | 2.4 | CVE-2023-26049 | CVE-2023-26049: OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| LOW | 1.9 | CVE-2026-3293 | CVE-2026-3293: Uncontrolled Resource Consumption |