Common Vulnerabilities and Exposures (CVE)

CVE-2025-8110

Jan 12, 2026 23:20:23 UTC

Improper Symbolic link handling in the PutContents API in Gogs allows Local Execution of Code.

CVE-2024-58340

Jan 12, 2026 23:05:00 UTC

LangChain versions up to and including 0.3.1 contain a regular expression denial-of-service (ReDoS) vulnerability in the MRKLOutputParser.parse() method (libs/langchain/langchain/agents/mrkl/output_parser.py). The parser applies a backtrack...

CVE-2024-14021

Jan 12, 2026 23:04:43 UTC

LlamaIndex (run-llama/llama_index) versions up to and including 0.11.6 contain an unsafe deserialization vulnerability in BGEM3Index.load_from_disk() in llama_index/indices/managed/bge_m3/base.py. The function uses pickle.load() to deserial...

CVE-2024-58339

Jan 12, 2026 23:04:25 UTC

LlamaIndex (run-llama/llama_index) versions up to and including 0.12.2 contain an uncontrolled resource consumption vulnerability in the VannaPack VannaQueryEngine implementation. The custom_query() logic generates SQL statements from a use...

CVE-2025-15514

Jan 12, 2026 23:03:52 UTC

Ollama 0.11.5-rc0 through current version 0.13.5 contain a null pointer dereference vulnerability in the multi-modal model image processing functionality. When processing base64-encoded image data via the /api/chat endpoint, the application...

CVE-2026-22214

Jan 12, 2026 23:03:23 UTC

RIOT OS versions up to and including 2026.01-devel-317 contain a stack-based buffer overflow vulnerability in the ethos utility due to missing bounds checking when processing incoming serial frame data. The vulnerability occurs in the _hand...

CVE-2026-22213

Jan 12, 2026 23:03:05 UTC

RIOT OS versions up to and including 2026.01-devel-317 contain a stack-based buffer overflow vulnerability in the tapslip6 utility. The vulnerability is caused by unsafe string concatenation in the devopen() function, which constructs a dev...

CVE-2026-22212

Jan 12, 2026 23:02:45 UTC

TinyOS versions up to and including 2.1.2 contain a stack-based buffer overflow vulnerability in the mcp2200gpio utility. The vulnerability is caused by unsafe use of strcpy() and strcat() functions when constructing device paths during aut...

CVE-2026-22801

Jan 12, 2026 22:57:58 UTC

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.26 to 1.6.53, there is an integer truncation in the libpng simplified write API functions p...

CVE-2026-22695

Jan 12, 2026 22:55:40 UTC

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.51 to 1.6.53, there is a heap buffer over-read in the libpng simplified API function png_im...

CVE-2026-22813

Jan 12, 2026 22:52:35 UTC

OpenCode is an open source AI coding agent. The markdown renderer used for LLM responses will insert arbitrary HTML into the DOM. There is no sanitization with DOMPurify or even a CSP on the web interface to prevent JavaScript execution via...

CVE-2026-22812

Jan 12, 2026 22:49:18 UTC

OpenCode is an open source AI coding agent. Prior to 1.0.216, OpenCode automatically starts an unauthenticated HTTP server that allows any local process (or any website via permissive CORS) to execute arbitrary shell commands with the user'...

CVE-2026-22805

Jan 12, 2026 22:36:35 UTC

Metabase is an open-source data analytics platform. Prior to 55.13, 56.3, and 57.1, self-hosted Metabase instances that allow users to create subscriptions could be potentially impacted if their Metabase is colocated with other unsecured re...

CVE-2017-6334

Jan 12, 2026 22:19:45 UTC

dnslookup.cgi on NETGEAR DGN2200 devices with firmware through 10.0.0.50 allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the host_name field of an HTTP POST request, a different vulnerability t...

CVE-2018-0147

Jan 12, 2026 22:14:20 UTC

A vulnerability in Java deserialization used by Cisco Secure Access Control System (ACS) prior to release 5.8 patch 9 could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is ...