Vulnerability Database

328,409

Total vulnerabilities in the database

Vulnerabilities for products matching "core"

Found 55 matching products. Filters apply to all results.

You can search for specific versions with /product/core/1.2.3

ractf / core

1 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium October 5, 2020 10/5/20
<= 41edf92

mobileiron / core

3 vulnerabilities found
Title Severity Exploit Date Affected Version
Critical July 7, 2020 7/7/20
>= 10.6.0.0 < 10.6.0.1
>= 10.5.2.0 < 10.5.2.1
>= 10.4.0.0 < 10.4.0.4
< 10.3.0.4
>= 10.5.1.0 < 10.5.1.1
Critical July 7, 2020 7/7/20
<= 10.6
High July 7, 2020 7/7/20
<= 10.6

formtools / core

3 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium August 31, 2021 8/31/21
<= 3.0.20
Medium August 31, 2021 8/31/21
<= 3.0.20
Critical August 31, 2021 8/31/21
<= 3.0.20

onlyoffice / core

2 vulnerabilities found
Title Severity Exploit Date Affected Version
Critical June 2, 2022 6/2/22
<= 6.1.0.26
Critical June 2, 2022 6/2/22
<= 6.1.0.26
Node.js icon

@nestjs / core

1 vulnerabilities found
Title Severity Exploit Date Affected Version
Low March 6, 2023 3/6/23
< 9.0.5
Composer icon

drupal / core

38 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium March 31, 2025 3/31/25
>= 8.0.0 < 10.3.13
>= 10.4.0 < 10.4.3
>= 11.0.0 < 11.0.12
>= 11.1.0 < 11.1.3
Medium March 31, 2025 3/31/25
>= 8.0.0 < 10.3.14
>= 10.4.0 < 10.4.5
>= 11.0.0 < 11.0.13
>= 11.1.0 < 11.1.5
High March 31, 2025 3/31/25
>= 8.0.0 < 10.3.13
>= 10.4.0 < 10.4.3
>= 11.0.0 < 11.0.12
>= 11.1.0 < 11.1.3
Low March 31, 2025 3/31/25
>= 8.0.0 < 10.3.13
>= 10.4.0 < 10.4.3
>= 11.0.0 < 11.0.12
>= 11.1.0 < 11.1.3
Medium May 15, 2024 5/15/24
>= 8.0.0 < 8.9.18
>= 9.1.0 < 9.1.12
>= 9.2.0 < 9.2.4
High May 15, 2024 5/15/24
>= 7.0.0 < 7.75
>= 8.0.0 < 8.8.12
>= 8.9.0 < 8.9.10
>= 9.0.0 < 9.0.9
Medium May 15, 2024 5/15/24
>= 7.0.0 < 7.70
Medium May 15, 2024 5/15/24
>= 8.0.0 < 8.7.12
>= 8.8.0 < 8.8.4
High May 15, 2024 5/15/24
>= 7.0.0 < 7.69
>= 8.0.0 < 8.7.11
>= 8.8.0 < 8.8.1
Medium May 15, 2024 5/15/24
>= 8.0.0 < 8.7.11
>= 8.8.0 < 8.8.1
Medium May 15, 2024 5/15/24
>= 8.0.0 < 8.7.11
>= 8.8.0 < 8.8.1
Medium May 15, 2024 5/15/24
>= 8.0.0 < 8.7.11
>= 8.8.0 < 8.8.1
Critical May 15, 2024 5/15/24
>= 8.0.0 < 8.5.8
>= 8.6.0 < 8.6.2
Critical May 15, 2024 5/15/24
>= 7.0 < 7.60
>= 8.0.0 < 8.5.8
>= 8.6.0 < 8.6.2
Medium May 15, 2024 5/15/24
>= 8.0.0 < 8.5.8
>= 8.6.0 < 8.6.2
Medium May 15, 2024 5/15/24
>= 7.0 < 7.60
>= 8.0.0 < 8.5.8
>= 8.6.0 < 8.6.2
Medium May 15, 2024 5/15/24
>= 8.0.0 < 8.5.8
>= 8.6.0 < 8.6.2
Medium February 12, 2024 2/12/24
>= 8.0.0 < 10.1.8
>= 10.2.0 < 10.2.2
High January 16, 2024 1/16/24
== 9.3.6
High September 28, 2023 9/28/23
>= 8.7.0 < 9.5.11
>= 10.0.0 < 10.0.11
>= 10.1.0 < 10.1.4
Medium April 26, 2023 4/26/23
>= 10.0.0 < 10.0.8
>= 9.5.0 < 9.5.8
>= 9.0.0 < 9.4.14
>= 7.0.0 < 7.96
High April 26, 2023 4/26/23
>= 8.0.0 < 9.3.19
>= 9.4.0 < 9.4.3
Medium April 26, 2023 4/26/23
>= 8.0.0 < 9.3.19
>= 9.4.0 < 9.4.3
Medium April 26, 2023 4/26/23
>= 8.0.0 < 9.3.19
>= 9.4.0 < 9.4.3
High April 26, 2023 4/26/23
>= 7.0.0 < 7.91
>= 8.0.0 < 9.3.19
>= 9.4.0 < 9.4.3
Medium April 26, 2023 4/26/23
>= 9.3.0 < 9.3.12
High April 26, 2023 4/26/23
>= 8.0.0 < 9.2.18
>= 9.3.0 < 9.3.12
Medium February 17, 2022 2/17/22
>= 9.3.0 < 9.3.6
>= 8.0.0 < 9.2.13
High February 16, 2022 2/16/22
>= 9.3.0 < 9.3.6
>= 8.0.0 < 9.2.13
>= 7.0.0 < 7.88
Medium February 11, 2022 2/11/22
>= 8.0.0 < 8.9.19
>= 9.1.0 < 9.1.13
>= 9.2.0 < 9.2.6
Medium February 11, 2022 2/11/22
>= 8.0.0 < 8.8.10
>= 8.9.0 < 8.9.6
>= 9.0.0 < 9.0.6
High February 11, 2022 2/11/22
>= 8.0.0 < 8.8.10
>= 8.9.0 < 8.9.6
>= 9.0.0 < 9.0.6
Medium February 11, 2022 2/11/22
>= 8.0.0 < 8.9.19
>= 9.1.0 < 9.1.13
>= 9.2.0 < 9.2.6
Critical February 11, 2022 2/11/22
>= 8.0.0 < 8.9.19
>= 9.1.0 < 9.1.13
>= 9.2.0 < 9.2.6
High November 20, 2020 11/20/20
>= 9.0.0 < 9.0.8
>= 8.9.0 < 8.9.9
>= 8.0.0 < 8.8.11
>= 7.0 < 7.74
Critical May 28, 2020 5/28/20
== 8.7.4
>= 8.7.4 < 8.7.5
Low January 22, 2019 1/22/19
>= 8.0 < 8.3.7
Critical July 19, 2018 7/19/18
>= 7.0 < 7.59
>= 8.0 < 8.4.8
>= 8.5 < 8.5.3
Composer icon

shopware / core

55 vulnerabilities found
Title Severity Exploit Date Affected Version
High March 11, 2026 3/11/26
>= 6.7.0.0 < 6.7.8.1
< 6.6.10.15
Medium March 11, 2026 3/11/26
>= 6.7.0.0 < 6.7.8.1
< 6.6.10.15
High March 11, 2026 3/11/26
>= 6.7.0.0 < 6.7.8.1
< 6.6.10.15
High January 14, 2026 1/14/26
>= 6.7.0.0 < 6.7.6.1
Medium November 14, 2025 11/14/25
< 6.6.10.9
>= 6.7.0.0 < 6.7.4.1
Medium October 21, 2025 10/21/25
>= 6.7.0.0 < 6.7.3.1
< 6.6.10.7
Medium October 21, 2025 10/21/25
>= 6.7.0.0 < 6.7.3.1
< 6.6.10.7
Low October 21, 2025 10/21/25
>= 6.7.0.0 < 6.7.3.1
< 6.6.10.7
Low October 21, 2025 10/21/25
>= 6.7.0.0 < 6.7.3.1
< 6.6.10.7
Medium October 21, 2025 10/21/25
>= 6.7.0.0 < 6.7.3.1
< 6.6.10.7
High September 10, 2025 9/10/25
>= 6.7.0.0 < 6.7.2.1
Medium April 15, 2025 4/15/25
>= 6.6.0.0 < 6.6.10.3
>= 6.7.0.0-rc1 < 6.7.0.0-rc2
== 6.7.0.0-rc1
< 6.5.8.18
Medium April 9, 2025 4/9/25
>= 6.6.0.0-rc1 < 6.6.10.3
>= 6.7.0.0-rc1 < 6.7.0.0-rc2
< 6.5.8.17
Medium April 8, 2025 4/8/25
>= 6.6.0.0 < 6.6.10.3
>= 6.7.0.0-rc1 < 6.7.0.0-rc2
< 6.5.8.17
High April 8, 2025 4/8/25
>= 6.6.0.0 < 6.6.10.3
>= 6.7.0.0-rc1 < 6.7.0.0-rc2
< 6.5.8.17
Medium April 8, 2025 4/8/25
>= 6.6.0.0 < 6.6.10.3
>= 6.7.0.0-rc1 < 6.7.0.0-rc2
== 6.7.0.0-rc1
< 6.5.8.18
High August 8, 2024 8/8/24
< 6.5.8.13
>= 6.6.0.0 < 6.6.5.1
High August 8, 2024 8/8/24
< 6.5.8.13
>= 6.6.0.0 < 6.6.5.1
High August 8, 2024 8/8/24
< 6.5.8.13
>= 6.6.0.0 < 6.6.5.1
Medium August 8, 2024 8/8/24
< 6.5.8.13
>= 6.6.0.0 < 6.6.5.1
Medium April 8, 2024 4/8/24
>= 6.3.5.0 < 6.5.8.8
>= 6.6.0.0-rc1 < 6.6.1.0
Low January 16, 2024 1/16/24
< 6.5.7.4
Critical January 16, 2024 1/16/24
< 6.5.7.4
High April 17, 2023 4/17/23
< 6.4.20.1
Low January 17, 2023 1/17/23
< 6.4.18.1
Low January 17, 2023 1/17/23
< 6.4.18.1
Low January 17, 2023 1/17/23
< 6.4.18.1
Medium January 17, 2023 1/17/23
< 6.4.18.1
Critical January 17, 2023 1/17/23
< 6.4.18.1
High April 20, 2022 4/20/22
< 6.4.10.1
High April 20, 2022 4/20/22
< 6.4.10.1
Medium March 9, 2022 3/9/22
< 6.4.8.2
Medium March 9, 2022 3/9/22
< 6.4.8.2
Medium March 9, 2022 3/9/22
< 6.4.8.1
Low March 9, 2022 3/9/22
< 6.4.8.1
Critical November 24, 2021 11/24/21
< 6.4.6.1
High August 16, 2021 8/16/21
< 6.4.3.1
High August 16, 2021 8/16/21
< 6.4.3.1
Medium August 16, 2021 8/16/21
< 6.4.3.1
High August 16, 2021 8/16/21
< 6.4.3.1
Medium August 16, 2021 8/16/21
< 6.4.3.1
Medium June 28, 2021 6/28/21
< 6.4.1.1
Medium June 28, 2021 6/28/21
< 6.4.1.1
High June 28, 2021 6/28/21
< 6.4.1.1
Low June 28, 2021 6/28/21
< 6.4.1.1
Medium June 28, 2021 6/28/21
< 6.4.1.1
Critical April 13, 2021 4/13/21
< 6.3.5.3
Critical April 13, 2021 4/13/21
< 6.3.5.3
Low December 21, 2020 12/21/20
< 6.3.4.1
Low December 21, 2020 12/21/20
< 6.3.4.1
Composer icon

mautic / core

37 vulnerabilities found
Title Severity Exploit Date Affected Version
High February 25, 2026 2/25/26
>= 2.10.0 < 5.2.10
>= 6.0.0-alpha < 6.0.8
>= 7.0.0-alpha < 7.0.1
Medium September 3, 2025 9/3/25
>= 4.4.0 < 4.4.17
>= 5.0.0-alpha < 5.2.8
>= 6.0.0-alpha < 6.0.5
Medium September 3, 2025 9/3/25
>= 4.4.0 < 4.4.17
>= 5.0.0-alpha < 5.2.8
>= 6.0.0-alpha < 6.0.5
Medium September 3, 2025 9/3/25
>= 4.4.0 < 4.4.17
>= 5.0.0-alpha < 5.2.8
>= 6.0.0-alpha < 6.0.5
Low September 3, 2025 9/3/25
>= 4.4.0 < 4.4.17
>= 5.0.0-alpha < 5.2.8
>= 6.0.0-alpha < 6.0.5
Medium May 28, 2025 5/28/25
>= 1.0.0 < 4.4.16
>= 5.0.0-alpha < 5.2.6
>= 6.0.0-alpha < 6.0.2
Medium May 28, 2025 5/28/25
>= 1.0.0 < 4.4.16
>= 5.0.0-alpha < 5.2.6
>= 6.0.0-alpha < 6.0.2
Low May 28, 2025 5/28/25
>= 5.0.0-alpha < 5.2.6
>= 6.0.0-alpha < 6.0.2
Medium May 28, 2025 5/28/25
>= 4.0.0 < 4.4.16
>= 5.0.0-alpha < 5.2.6
>= 6.0.0-alpha < 6.0.2
Medium May 28, 2025 5/28/25
>= 4.4.0 < 4.4.16
>= 5.0.0-alpha < 5.2.6
>= 6.0.0-alpha < 6.0.2
High February 26, 2025 2/26/25
>= 1.0.1 < 5.2.3
Critical February 26, 2025 2/26/25
< 5.2.3
Low February 26, 2025 2/26/25
< 5.2.3
Medium September 18, 2024 9/18/24
>= 1.0.0-beta4 < 4.4.12
>= 5.0.0-alpha < 5.0.4
High September 18, 2024 9/18/24
< 3.3.5
>= 4.0.0 < 4.2.0
Low September 18, 2024 9/18/24
< 4.4.12
Medium September 18, 2024 9/18/24
>= 2.14.1 < 4.4.12
>= 5.0.0-alpha < 5.0.4
High September 18, 2024 9/18/24
>= 1.0.2 < 4.4.12
>= 5.0.0-alpha < 5.0.4
High September 17, 2024 9/17/24
>= 3.3.0 < 4.4.12
>= 5.0.0-alpha < 5.0.4
High September 17, 2024 9/17/24
>= 1.0.0-beta2 < 4.4.12
Critical June 20, 2022 6/20/22
< 4.3.0
Medium August 30, 2021 8/30/21
< 3.3.4
High August 30, 2021 8/30/21
< 3.3.4
High August 30, 2021 8/30/21
< 3.3.4
High August 30, 2021 8/30/21
< 3.3.4
Low August 30, 2021 8/30/21
< 3.3.4
Medium March 23, 2021 3/23/21
< 3.3.2
Critical February 9, 2021 2/9/21
< 2.16.5
>= 3.0.0 < 3.2.4
Critical January 28, 2021 1/28/21
< 2.16.5
>= 3.0.0 < 3.2.4
Medium September 20, 2019 9/20/19
< 2.14.0
Low September 6, 2019 9/6/19
== 2.13.1
>= 2.13.1 < 2.14.0
High April 18, 2018 4/18/18
< 2.13.0
Low April 18, 2018 4/18/18
< 2.13.0
Medium April 17, 2018 4/17/18
< 2.13.0
Medium January 3, 2018 1/3/18
>= 2.0.0 < 2.12.0
Low January 3, 2018 1/3/18
>= 1.0.0 < 2.12.0
Low January 3, 2018 1/3/18
>= 2.1.0 < 2.12.0
Composer icon

bolt / core

2 vulnerabilities found
Title Severity Exploit Date Affected Version
High April 11, 2022 4/11/22
<= 4.2
High February 17, 2021 2/17/21
< 4.1.13
Composer icon

ibexa / core

5 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium March 20, 2024 3/20/24
>= 4.5.0 < 4.5.6
>= 4.6.0 < 4.6.2
Low November 3, 2023 11/3/23
>= 4.5.0 < 4.5.4
Critical November 10, 2022 11/10/22
>= 4.2.0 < 4.2.3
Critical June 2, 2022 6/2/22
>= 4.0.0 < 4.0.7
>= 4.1.0 < 4.1.4
Critical April 29, 2022 4/29/22
>= 4.0.0 < 4.0.5
>= 4.1.0 < 4.1.2
Composer icon

s-cart / core

2 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium September 23, 2025 9/23/25
<= 9.0.5
Medium May 1, 2022 5/1/22
< 6.9
Node.js icon

@angular / core

4 vulnerabilities found
Title Severity Exploit Date Affected Version
High March 13, 2026 3/13/26
>= 22.0.0-next.0 < 22.0.0-next.3
>= 21.0.0-next.0 < 21.2.4
>= 20.0.0-next.0.0.0 < 20.3.18
>= 19.0.0.next.0 < 19.2.20
>= 17.0.0.next.0 <= 18.2.14
High February 27, 2026 2/27/26
>= 21.2.0-next.0 < 21.2.0
>= 21.0.0-next.0 < 21.1.6
>= 20.0.0-next.0 < 20.3.17
>= 19.0.0-next.0 < 19.2.19
<= 18.2.14
High January 9, 2026 1/9/26
>= 21.1.0-next.0 < 21.1.0-rc.0
>= 21.0.0-next.0 < 21.0.7
>= 20.0.0-next.0 < 20.3.16
>= 19.0.0-next.0 < 19.2.18
<= 18.2.14
Low May 26, 2022 5/26/22
< 11.0.5
>= 11.1.0-next.0 < 11.1.0-next.3
Composer icon

concrete5 / core

9 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium June 24, 2022 6/24/22
>= 9.0.0 < 9.1.0
< 8.5.8
Critical June 24, 2022 6/24/22
>= 9.0.0 < 9.1.0
< 8.5.8
Critical June 24, 2022 6/24/22
>= 9.0.0 < 9.1.0
< 8.5.8
High November 19, 2021 11/19/21
< 8.5.7
High November 19, 2021 11/19/21
< 8.5.7
High November 19, 2021 11/19/21
< 8.5.7
High November 19, 2021 11/19/21
< 8.5.7
Medium November 19, 2021 11/19/21
< 8.5.7
High November 19, 2021 11/19/21
< 8.5.7
Node.js icon

@actions / core

2 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium August 15, 2022 8/15/22
< 1.9.1
Low October 1, 2020 10/1/20
< 1.2.6
Node.js icon

@keystone-6 / core

5 vulnerabilities found
Title Severity Exploit Date Affected Version
Low May 5, 2025 5/5/25
< 6.5.0
Low August 15, 2023 8/15/23
< 5.5.1
Low June 12, 2023 6/12/23
<= 5.3.1
Critical November 3, 2022 11/3/22
>= 3.0.0 < 3.0.2
Critical October 25, 2022 10/25/22
>= 2.2.0 < 2.3.1
Composer icon

badaso / core

3 vulnerabilities found
Title Severity Exploit Date Affected Version
Critical August 26, 2025 8/26/25
<= 2.9.11
Critical November 25, 2022 11/25/22
< 2.7.0
Critical October 25, 2022 10/25/22
< 2.6.1
Composer icon

flarum / core

8 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium March 12, 2025 3/12/25
< 1.8.10
Medium January 5, 2024 1/5/24
< 1.8.5
High August 16, 2023 8/16/23
< 1.8.0
Medium March 10, 2023 3/10/23
< 1.7.0
Low January 13, 2023 1/13/23
>= 1.3.0 < 1.6.3
Medium January 12, 2023 1/12/23
< 1.6.3
Critical November 19, 2022 11/19/22
>= 1.5.0 < 1.6.2
Critical June 7, 2021 6/7/21
>= 1.0.0 < 1.0.2
Node.js icon

@sequelize / core

3 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium February 16, 2023 2/16/23
< 7.0.0-alpha.20
Critical February 16, 2023 2/16/23
< 7.0.0-alpha.20
Critical February 16, 2023 2/16/23
< 7.0.0-alpha.20
Composer icon

api-platform / core

6 vulnerabilities found
Title Severity Exploit Date Affected Version
High April 3, 2025 4/3/25
>= 4.0.0-alpha.1 < 4.0.22
< 3.4.17
>= 4.1.0-alpha.1 < 4.1.5
High April 3, 2025 4/3/25
>= 4.0.0-alpha.1 < 4.0.22
< 3.4.17
>= 4.1.0-alpha.1 < 4.1.5
Medium April 3, 2025 4/3/25
>= 3.2.0 < 3.2.5
Low March 24, 2025 3/24/25
>= 3.3.8 < 3.3.15
High February 28, 2023 2/28/23
>= 3.0.0 < 3.0.12
>= 3.1.0 < 3.1.3
>= 2.6.0 < 2.7.10
Medium February 4, 2019 2/4/19
>= 2.2.0 < 2.2.10
>= 2.3.0 < 2.3.6
>= 2.2.0 <= 2.3.5
Node.js icon

@sap-cloud-sdk / core

2 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium November 5, 2021 11/5/21
< 1.52.0
High September 3, 2020 9/3/20
>= 1.19.0 < 1.21.2
Node.js icon

@ionic / core

1 vulnerabilities found
Title Severity Exploit Date Affected Version
High September 3, 2020 9/3/20
< 4.0.3
>= 4.1.0 < 4.1.3
>= 4.2.0 < 4.2.1
>= 4.3.0 < 4.3.1
Node.js icon

@tsed / core

1 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium October 20, 2020 10/20/20
< 5.65.7
Node.js icon

@vendure / core

3 vulnerabilities found
Title Severity Exploit Date Affected Version
Low January 30, 2026 1/30/26
< 3.5.3
Medium November 17, 2023 11/17/23
< 2.1.3
Low July 11, 2023 7/11/23
< 2.0.3

pimcore / core

1 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium September 27, 2023 9/27/23
< 10.3.0
Node.js icon

@scrypted / core

2 vulnerabilities found
Title Severity Exploit Date Affected Version
High February 16, 2024 2/16/24
<= 0.1.142
Medium December 13, 2023 12/13/23
<= 0.1.142
Composer icon

fuel / core

2 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium May 15, 2024 5/15/24
< 1.8.1
High May 15, 2024 5/15/24
< 1.8.0.4
Maven icon

org.verapdf / core

1 vulnerabilities found
Title Severity Exploit Date Affected Version
High March 28, 2024 3/28/24
< 1.24.2
Composer icon

contao / core

2 vulnerabilities found
Title Severity Exploit Date Affected Version
High May 15, 2024 5/15/24
>= 2.0.0 < 2.11.14
>= 3.0.0 < 3.2.5
Critical May 15, 2024 5/15/24
>= 2.0.0 < 2.11.17
>= 3.0.0 < 3.2.9
Node.js icon

@janhq / core

3 vulnerabilities found
Title Severity Exploit Date Affected Version
Critical June 4, 2024 6/4/24
<= 0.1.11
High June 4, 2024 6/4/24
<= 0.1.11
Critical June 4, 2024 6/4/24
<= 0.1.11
Node.js icon

@zenuml / core

1 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium June 26, 2024 6/26/24
< 3.23.25
Node.js icon

@zag-js / core

1 vulnerabilities found
Title Severity Exploit Date Affected Version
High February 5, 2025 2/5/25
< 0.82.2
Node.js icon

@intlify / core

2 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium July 16, 2025 7/16/25
>= 9.0.0 < 9.14.5
>= 10.0.0 < 10.0.8
>= 11.0.0 < 11.1.10
High March 7, 2025 3/7/25
>= 9.1.0 < 9.1.11
Node.js icon

@pkgr / core

1 vulnerabilities found
Title Severity Exploit Date Affected Version
High July 19, 2025 7/19/25
== 0.2.8
>= 0.2.8 < 0.2.9
Maven icon

com.ritense.valtimo / core

1 vulnerabilities found
Title Severity Exploit Date Affected Version
Critical August 28, 2025 8/28/25
< 12.16.0.RELEASE
>= 13.0.0.RELEASE < 13.1.2.RELEASE
Composer icon

gp247 / core

1 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium September 23, 2025 9/23/25
< 1.1.24
Node.js icon

@strapi / core

3 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium October 16, 2025 10/16/25
< 5.10.3
Medium October 16, 2025 10/16/25
< 5.20.0
High October 16, 2025 10/16/25
>= 5.0.0 < 5.5.2
Node.js icon

@hpke / core

1 vulnerabilities found
Title Severity Exploit Date Affected Version
Critical November 21, 2025 11/21/25
< 1.7.5
Node.js icon

@orval / core

2 vulnerabilities found
Title Severity Exploit Date Affected Version
Critical January 30, 2026 1/30/26
>= 7.19.0 < 7.21.0
>= 8.0.0 < 8.2.0
Critical January 21, 2026 1/21/26
>= 8.0.0-rc.0 < 8.0.2
< 7.19.0
Node.js icon

@enclave-vm / core

2 vulnerabilities found
Title Severity Exploit Date Affected Version
Critical February 25, 2026 2/25/26
< 2.11.1
Medium February 5, 2026 2/5/26
< 2.10.1
Node.js icon

@farmfe / core

1 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium February 12, 2026 2/12/26
< 1.7.6
Composer icon

typicms / core

1 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium February 25, 2026 2/25/26
< 16.1.7
Node.js icon

@workflow / core

1 vulnerabilities found
Title Severity Exploit Date Affected Version
Medium March 6, 2026 3/6/26
< 4.2.0-beta.64

Showing vulnerabilities for 55 products matching "core". Each product has independent pagination.

Frequently Asked Questions

A security vulnerability is a weakness in software, hardware, or configuration that can be exploited to compromise confidentiality, integrity, or availability. Many vulnerabilities are tracked as CVEs (Common Vulnerabilities and Exposures), which provide a standardized identifier so teams can coordinate patching, mitigation, and risk assessment across tools and vendors.

CVSS (Common Vulnerability Scoring System) estimates technical severity, but it doesn't automatically equal business risk. Prioritize using context like internet exposure, affected asset criticality, known exploitation (proof-of-concept or in-the-wild), and whether compensating controls exist. A "Medium" CVSS on an exposed, production system can be more urgent than a "Critical" on an isolated, non-production host.

A vulnerability is the underlying weakness. An exploit is the method or code used to take advantage of it. A zero-day is a vulnerability that is unknown to the vendor or has no publicly available fix when attackers begin using it. In practice, risk increases sharply when exploitation becomes reliable or widespread.

Recurring findings usually come from incomplete Asset Discovery, inconsistent patch management, inherited images, and configuration drift. In modern environments, you also need to watch the software supply chain: dependencies, containers, build pipelines, and third-party services can reintroduce the same weakness even after you patch a single host. Unknown or unmanaged assets (often called Shadow IT) are a common reason the same issues resurface.

Use a simple, repeatable triage model: focus first on externally exposed assets, high-value systems (identity, VPN, email, production), vulnerabilities with known exploits, and issues that enable remote code execution or privilege escalation. Then enforce patch SLAs and track progress using consistent metrics so remediation is steady, not reactive.

SynScan combines attack surface monitoring and continuous security auditing to keep your inventory current, flag high-impact vulnerabilities early, and help you turn raw findings into a practical remediation plan.