db

package

Versions in this module

v0
Dec 22, 2024 GO-2026-4480 +12 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4795: Vikunja read-only users can delete project background images via broken object-level authorization in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Nov 21, 2024 GO-2026-4480 +12 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4795: Vikunja read-only users can delete project background images via broken object-level authorization in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Sep 29, 2024 GO-2026-4480 +12 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4795: Vikunja read-only users can delete project background images via broken object-level authorization in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Sep 20, 2024 GO-2026-4480 +12 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4795: Vikunja read-only users can delete project background images via broken object-level authorization in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Aug 12, 2024 GO-2026-4480 +12 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4795: Vikunja read-only users can delete project background images via broken object-level authorization in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Jul 18, 2024 GO-2026-4480 +12 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4795: Vikunja read-only users can delete project background images via broken object-level authorization in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Jul 2, 2024 GO-2026-4480 +12 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4795: Vikunja read-only users can delete project background images via broken object-level authorization in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Changes in this version
Feb 10, 2024 GO-2026-4480 +12 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4795: Vikunja read-only users can delete project background images via broken object-level authorization in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Jan 28, 2024 GO-2026-4480 +12 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4795: Vikunja read-only users can delete project background images via broken object-level authorization in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Dec 19, 2023 GO-2026-4480 +12 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4795: Vikunja read-only users can delete project background images via broken object-level authorization in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Jul 7, 2023 GO-2026-4480 +12 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4795: Vikunja read-only users can delete project background images via broken object-level authorization in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Mar 12, 2023 GO-2026-4480 +12 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4795: Vikunja read-only users can delete project background images via broken object-level authorization in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Mar 10, 2023 GO-2026-4480 +12 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4795: Vikunja read-only users can delete project background images via broken object-level authorization in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Jan 24, 2023 GO-2026-4480 +12 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4795: Vikunja read-only users can delete project background images via broken object-level authorization in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Nov 11, 2022 GO-2026-4480 +11 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Oct 28, 2022 GO-2026-4480 +11 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Aug 17, 2022 GO-2026-4480 +11 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Aug 17, 2022 GO-2026-4480 +11 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Aug 3, 2022 GO-2026-4480 +11 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Sep 8, 2021 GO-2026-4480 +11 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Sep 5, 2021 GO-2026-4480 +11 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Jun 9, 2021 GO-2026-4480 +11 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
May 14, 2021 GO-2026-4480 +11 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Apr 22, 2021 GO-2026-4480 +11 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Jan 10, 2021 GO-2026-4480 +11 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Oct 20, 2020 GO-2026-4480 +11 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Oct 19, 2020 GO-2026-4480 +11 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Jul 7, 2020 GO-2026-4480 +11 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
Jul 1, 2020 GO-2026-4480 +11 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api
May 19, 2020 GO-2026-4480 +11 more
Alert  GO-2026-4480: Vikunja Vulnerable to XSS Via Task Preview in code.vikunja.io/api
Alert  GO-2026-4551: Vijkunja has Weak Password Policy Combined with Persistent Sessions After Password Change in code.vikunja.io/api
Alert  GO-2026-4552: Vikunja has Reflected HTML Injection via filter Parameter in its Projects Module in code.vikunja.io/api
Alert  GO-2026-4553: Vikunja: Stored XSS via Unsanitized SVG Attachment Upload Leads to Token Exposure in code.vikunja.io/api
Alert  GO-2026-4556: Vikunja has Path Traversal in CLI Restore in code.vikunja.io/api
Alert  GO-2026-4575: Vikunja Vulnerable to Account Takeover via Password Reset Token Reuse in code.vikunja.io/api
Alert  GO-2026-4791: Vikunja has a Rate-Limit Bypass for Unauthenticated Users via Spoofed Headers in code.vikunja.io/api
Alert  GO-2026-4794: Vikunja has a 2FA Bypass via Caldav Basic Auth in code.vikunja.io/api
Alert  GO-2026-4797: Vikunja has an IDOR in Task Comments Allows Reading Arbitrary Comments in code.vikunja.io/api
Alert  GO-2026-4798: Vikunja’s Improper Access Control Enables Bypass of Administrator-Imposed Account Disablement in code.vikunja.io/api
Alert  GO-2026-4805: Vikunja has TOTP Reuse During Validity Window in code.vikunja.io/api
Alert  GO-2026-4811: Vikunja Affected by DoS via Image Preview Generation in code.vikunja.io/api

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL