296,202
Total vulnerabilities in the database
Any unauthenticated attacker can bypass the localhost restrictions posed by the application and utilize this to create arbitrary packages
Software | From | Fixed in |
---|---|---|
![]() |
- | 0.5.0b3.dev88.x |