Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| go-vikunja | vikunja | < 2.3.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC
| CVE-2026-35595 | 8.3 HIGH | Vikunja Affected by Privilege Escalation via Project Reparenting |
| CVE-2026-34727 | 7.4 HIGH | Vikunja ahs a TOTP Two-Factor Authentication Bypass via OIDC Login Path |
| CVE-2026-35594 | 6.5 MEDIUM | Vikunja Link Share JWT tokens remain valid for 72 hours after share deletion or permission |
| CVE-2026-35599 | 6.5 MEDIUM | Vikunja has an Algorithmic Complexity DoS in Repeating Task Handler |
| CVE-2026-35597 | 5.9 MEDIUM | Vikunja Affected by TOTP Brute-Force Due to Non-Functional Account Lockout |
| CVE-2026-35600 | 5.4 MEDIUM | Vikunja has HTML Injection via Task Titles in Overdue Email Notifications |
| CVE-2026-35602 | 5.4 MEDIUM | Vikunja has a File Size Limit Bypass via Vikunja Import |
| CVE-2026-35596 | 4.3 MEDIUM | Vikunja has Broken Access Control on Label Read via SQL Operator Precedence Bug |
| CVE-2026-35598 | 4.3 MEDIUM | Vikunja has Missing Authorization on CalDAV Task Read |
| CVE-2026-40103 | 4.3 MEDIUM | Vikunja's Scoped API tokens with projects.background permission can delete project backgro |
No comments yet