Frappe Frappe

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Frappe product.

RSS Feeds for Frappe security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Frappe products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Frappe Sorted by Most Security Vulnerabilities since 2018

Frappe39 vulnerabilities

Frappe Erpnext38 vulnerabilities

Frappe Lms15 vulnerabilities

Frappe Lms2 vulnerabilities

Frappe Crm1 vulnerability

Frappe Helpdesk1 vulnerability

By the Year

In 2026 there have been 26 vulnerabilities in Frappe with an average score of 7.1 out of ten. Last year, in 2025 Frappe had 46 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Frappe in 2026 could surpass last years number. However, the average CVE base score of the vulnerabilities in 2026 is greater by 0.26.




Year Vulnerabilities Average Score
2026 26 7.14
2025 46 6.88
2024 4 6.47
2023 4 7.20
2022 7 5.76
2021 0 0.00
2020 13 6.40
2019 4 6.10
2018 2 0.00

It may take a day or so for new Frappe vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Frappe Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2026-41430 Apr 24, 2026
Frappe Press Login Reflected XSS via Redirect Param Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). Redirect parameter on login page is vulnerable to reflected XSS. The patch in commit 16d1b6ca2559f858a1de77bcb03fd7f1b81671c6 fixes the issue by restricting redirects to internal URLs only.
CVE-2026-41317 Apr 24, 2026
Press CSRF via GET on create_api_secret Endpoint Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS).`press.api.account.create_api_secret` is prone to CSRF-like exploits. This endpoint writes to database and it is also accessible via GET method. The patch in commit 52ea2f2d1b587be0807557e96f025f47897d00fd restricts method to POST.
CVE-2026-3837 Apr 22, 2026
Frappe 16.10.0 XSS via formatter interpolation in Desk documents An authenticated attacker can persist crafted values in multiple field types and trigger client-side script execution when another user opens the affected document in Desk. The vulnerable formatter implementations interpolate stored values into raw HTML attributes and element content without escaping This issue affects Frappe: 16.10.0.
Frappe
CVE-2026-3673 Apr 22, 2026
Frappe 16.10.10 XSS via Unescaped _user_tags in List/Report View An authenticated attacker can store a crafted tag value in _user_tags and trigger JavaScript execution when a victim opens the list/report view where tags are rendered. The vulnerable renderer interpolates tag content into HTML attributes and element content without escaping. This issue affects Frappe: 16.10.10.
Frappe
CVE-2026-41320 Apr 21, 2026
SQLi in Frappe HR v<15.54.0 / v<14.38.1 Endpoint Frappe HR is an open-source human resources management solution (HRMS). Prior to versions 15.54.0 and 14.38.1, a specially crafted request made to a certain endpoint could result in SQL injection, allowing an attacker to extract information they wouldn't otherwise be able to. Versions 15.54.0 and 14.38.1 contain a patch. No known workarounds are available.
CVE-2026-40889 Apr 21, 2026
Unauthorized File Access via API in Frappe HR <v15.58.2/16.4.2 Frappe HR is an open-source human resources management solution (HRMS). Prior to versions 15.58.2 and 16.4.2, authenticated users can access unauthorized files by exploiting certain api endpoint. Versions 15.58.2 and 16.4.2 contain a patch. No known workarounds are available.
CVE-2026-40888 Apr 21, 2026
Frappe HRMS Authenticated Info Disclosure Via API before 15.58.1 & 16.4.1 Frappe HR is an open-source human resources management solution (HRMS). Prior to versions 15.58.1 and 16.4.1, an authenticated user with default role can access unauthorized information by exploiting certain api endpoint. Versions 15.58.1 and 16.4.1 contain a patch. No known workarounds are available.
CVE-2026-39415 Apr 08, 2026
Frappe LMS <2.46.0: ClientSide Score Modification Frappe Learning Management System (LMS) is a learning system that helps users structure their content. Prior to 2.46.0, a vulnerability has been identified in Frappe Learning where quiz scores can be modified by students before submission. The application currently relies on client-side calculated scores, which can be altered using browser developer tools prior to sending the submission request. While this does not allow modification of other users data or privilege escalation, it compromises the integrity of quiz results and undermines academic reliability. This issue affects data integrity but does not expose confidential information or allow unauthorized access to other accounts. This vulnerability is fixed in 2.46.0.
Lms
CVE-2026-31017 Apr 08, 2026
SSRF via PDF Render in ERPNext 16.0.1 Print Format A Server-Side Request Forgery (SSRF) vulnerability exists in the Print Format functionality of ERPNext v16.0.1 and Frappe Framework v16.1.1, where user-supplied HTML is insufficiently sanitized before being rendered into PDF. When generating PDFs from user-controlled HTML content, the application allows the inclusion of HTML elements such as <iframe> that reference external resources. The PDF rendering engine automatically fetches these resources on the server side. An attacker can abuse this behavior to force the server to make arbitrary HTTP requests to internal services, including cloud metadata endpoints, potentially leading to sensitive information disclosure.
Erpnext
CVE-2026-39351 Apr 07, 2026
Frappe <16.14.0/15.104.0 Unrestricted Doctype API Access Frappe is a full-stack web application framework. Prior to 16.14.0 and 15.104.0, Frappe allows unrestricted Doctype access via API exploit.
Frappe
CVE-2026-35614 Apr 07, 2026
Frappe SQLi via bulk_update v<16.14.0 & v<15.104.0 Frappe is a full-stack web application framework. Prior to 16.14.0 and 15.104.0, Frappe has a SQL injection in bulk_update. This vulnerability is fixed in 16.14.0 and 15.104.0.
Frappe
CVE-2026-34606 Apr 02, 2026
Frappe LMS stored XSS 2.27.0-2.47.9 (fixed 2.48.0) Frappe Learning Management System (LMS) is a learning system that helps users structure their content. From version 2.27.0 to before version 2.48.0, Frappe LMS was vulnerable to stored XSS. This issue has been patched in version 2.48.0.
Lms
CVE-2026-32954 Mar 20, 2026
ERP <16.8.0/15.100.0: Time/Boolean Blind SQLi via API Endpoints ERP is a free and open source Enterprise Resource Planning tool. In versions prior to 16.8.0 and 15.100.0, certain endpoints were vulnerable to time-based and boolean-based blind SQL injection due to insufficient parameter validation, allowing attackers to infer database information. This issue has been fixed in versions 15.100.0 and 16.8.0.
Erpnext
CVE-2026-31879 Mar 11, 2026
Frappe <=16.10.0 Privilege Escalation & Stored XSS in Workspaces Frappe is a full-stack web application framework. Prior to 14.100.2, 15.101.0, and 16.10.0, due to a lack of validation and improper permission checks, users could modify other user's private workspaces. Specially crafted requests could lead to stored XSS here. This vulnerability is fixed in 14.100.2, 15.101.0, and 16.10.0.
Frappe
CVE-2026-31878 Mar 11, 2026
SSRF in Frappe Endpoint (<14.100.1,<15.100.0,<16.6.0) Frappe is a full-stack web application framework. Prior to 14.100.1, 15.100.0, and 16.6.0, a malicious user could send a crafted request to an endpoint which would lead to the server making an HTTP call to a service of the user's choice. This vulnerability is fixed in 14.100.1, 15.100.0, and 16.6.0.
Frappe
CVE-2026-31877 Mar 11, 2026
SQL Injection in Frappe Endpoint Pre-15.84.0/14.99.0 (CVE-2026-31877) Frappe is a full-stack web application framework. Prior to 15.84.0 and 14.99.0, a specially crafted request made to a certain endpoint could result in SQL injection, allowing an attacker to extract information they wouldn't otherwise be able to. This vulnerability is fixed in 15.84.0 and 14.99.0.
Frappe
CVE-2026-29081 Mar 05, 2026
SQLi in Frappe web framework before v14.100.1 & v15.100.0 Frappe is a full-stack web application framework. Prior to versions 14.100.1 and 15.100.0, an endpoint was vulnerable to SQL injection through specially crafted requests, which would allow a malicious actor to extract sensitive information. This issue has been patched in versions 14.100.1 and 15.100.0.
Frappe
CVE-2026-29077 Mar 05, 2026
Document Sharing Privilege Escalation in Frappe <15.98.0 / <14.100.0 Frappe is a full-stack web application framework. Prior to versions 15.98.0 and 14.100.0, due to a lack of validation when sharing documents, a user could share a document with a permission that they themselves didn't have. This issue has been patched in versions 15.98.0 and 14.100.0.
Frappe
CVE-2026-28436 Mar 05, 2026
Frappe XSS via Crafted Image URL before v16.11.0/15.102.0 Frappe is a full-stack web application framework. Prior to versions 16.11.0 and 15.102.0, an attacker can set a crafted image URL that results in XSS when the avatar is displayed, and it can be triggered for other users via website page comments. This issue has been patched in versions 16.11.0 and 15.102.0.
Frappe
CVE-2026-27471 Feb 21, 2026
Unauthorized Document Access in ERPNext <=15.98.0,16.0.0-rc.1&<=16.6.0 (CVE-2026-27471) ERP is a free and open source Enterprise Resource Planning tool. In versions up to 15.98.0 and 16.0.0-rc.1 and through 16.6.0, certain endpoints lacked access validation which allowed for unauthorized document access. This issue has been fixed in versions 15.98.1 and 16.6.1.
Erpnext
CVE-2026-26977 Feb 20, 2026
Unauthorized API Access in Frappe LMS 2.44.0 (before 2.45.0) Frappe Learning Management System (LMS) is a learning system that helps users structure their content. In versions 2.44.0 and below, unauthorized users are able to access the details of unpublished courses via API endpoints. A fix for this issue is planned for the 2.45.0 release.
Lms
CVE-2026-26031 Feb 11, 2026
Unauth Enum Enrolled Students via Batch in Frappe LMS <2.44.0 Frappe Learning Management System (LMS) is a learning system that helps users structure their content. Prior to 2.44.0, security issue was identified in Frappe Learning, where unauthorised users were able to access the full list of enrolled students (by email) in batches. This vulnerability is fixed in 2.44.0.
Lms
CVE-2026-25956 Feb 10, 2026
Frappe <=15.94.0: Open Redirect/Reflected XSS via Bad Signup URL Frappe is a full-stack web application framework. Prior to 14.99.14 and 15.94.0, an attacker could craft a malicious signup URL for a frappe site which could lead to an open redirect (or reflected XSS, depending on the crafted payload) when a user signs up. This vulnerability is fixed in 14.99.14 and 15.94.0.
Frappe
CVE-2025-65923 Feb 03, 2026
ERPNext 15.88.1 CSV Import Stored XSS via Update Existing Records A Stored Cross-Site Scripting (XSS) vulnerability was discovered within the CSV import mechanism of ERPNext thru 15.88.1 when using the Update Existing Recordsoption. An attacker can embed malicious JavaScript code into a CSV field, which is then stored in the database and executed whenever the affected record is viewed by a user within the ERPNext web interface. This exposure may allow an attacker to compromise user sessions or perform unauthorized actions under the context of a victim's account.
Erpnext
CVE-2026-23497 Jan 14, 2026
Stored XSS in Frappe LMS 2.44.0 via Image Filename Frappe Learning Management System (LMS) is a learning system that helps users structure their content. In 2.44.0 and earlier, there is a stored XSS vulnerability where a specially crafted image filename could execute malicious JavaScript when rendered on course or jobs pages.
Lms
CVE-2025-68953 Jan 05, 2026
Frappe Framework 14.99.5-15.80.1 Path Traversal via Unsanitized Requests Frappe is a full-stack web application framework. Versions 14.99.5 and below and 15.0.0 through 15.80.1 include requests that are vulnerable to path traversal attacks. Arbitrary files from the server could be retrieved due to a lack of proper sanitization on some requests. This issue is fixed in versions 14.99.6 and 15.88.1. To workaround, changing the setup to use a reverse proxy is recommended.
Frappe
CVE-2025-68929 Dec 29, 2025
Frappe is a full-stack web application framework Frappe is a full-stack web application framework. Prior to versions 14.99.6 and 15.88.1, an authenticated user with specific permissions could be tricked into accessing a specially crafted link. This could lead to a malicious template being executed on the server, resulting in remote code execution. Versions 14.99.6 and 15.88.1 fix the issue. No known workarounds are available.
Frappe
CVE-2025-68928 Dec 29, 2025
Frappe CRM is an open-source customer relationship management tool Frappe CRM is an open-source customer relationship management tool. Prior to version 1.56.2, authenticated users could set crafted URLs in a website field, which were not sanitized, causing cross-site scripting. Version 1.56.2 fixes the issue. No known workarounds are available.
CVE-2025-66436 Dec 15, 2025
SSTI in Frappe ERPNext <=15.89.0 via Jinja Terms injection An SSTI (Server-Side Template Injection) vulnerability exists in the get_terms_and_conditions method of Frappe ERPNext through 15.89.0. The function renders attacker-controlled Jinja2 templates (terms) using frappe.render_template() with a user-supplied context (doc). Although Frappe uses a custom SandboxedEnvironment, several dangerous globals such as frappe.db.sql are still available in the execution context via get_safe_globals(). An authenticated attacker with access to create or modify a Terms and Conditions document can inject arbitrary Jinja expressions into the terms field, resulting in server-side code execution within a restricted but still unsafe context. This vulnerability can be used to leak database information.
Erpnext
CVE-2025-66437 Dec 15, 2025
ERPNext 15.89.0: SSTI via get_address_display (Jinja Sandbox Bypass) An SSTI (Server-Side Template Injection) vulnerability exists in the get_address_display method of Frappe ERPNext through 15.89.0. This function renders address templates using frappe.render_template() with a context derived from the address_dict parameter, which can be either a dictionary or a string referencing an Address document. Although ERPNext uses a custom Jinja2 SandboxedEnvironment, dangerous functions like frappe.db.sql remain accessible via get_safe_globals(). An authenticated attacker with permission to create or modify an Address Template can inject arbitrary Jinja expressions into the template field. By creating an Address document with a matching country, and then calling the get_address_display API with address_dict="address_name", the system will render the malicious template using attacker-controlled data. This leads to server-side code execution or database information disclosure.
Erpnext
CVE-2025-66438 Dec 15, 2025
SSTI in Frappe ERPNext 15.89.0 Print Format Rendering A Server-Side Template Injection (SSTI) vulnerability exists in the Frappe ERPNext through 15.89.0 Print Format rendering mechanism. Specifically, the API frappe.www.printview.get_html_and_style() triggers the rendering of the html field inside a Print Format document using frappe.render_template(template, doc) via the get_rendered_template() call chain. Although ERPNext wraps Jinja2 in a SandboxedEnvironment, it exposes sensitive functions such as frappe.db.sql through get_safe_globals(). An authenticated attacker with permission to create or modify a Print Format can inject arbitrary Jinja expressions into the html field. Once the malicious Print Format is saved, the attacker can call get_html_and_style() with a target document (e.g., Supplier or Sales Invoice) to trigger the render process. This leads to information disclosure from the database, such as database version, schema details, or sensitive values, depending on the injected payload. Exploitation flow: Create a Print Format with SSTI payload in the html field; call the get_html_and_style() API; triggers frappe.render_template(template, doc) inside get_rendered_template(); leaks database information via frappe.db.sql or other exposed globals.
Erpnext
CVE-2025-66439 Dec 15, 2025
ERPNext v15.89.0 - SQLi via get_outstanding_reference_documents() in payment_entry.py An issue was discovered in Frappe ERPNext through 15.89.0. Function get_outstanding_reference_documents() at erpnext.accounts.doctype.payment_entry.payment_entry.py is vulnerable to SQL Injection. It allows an attacker to extract arbitrary data from the database by injecting SQL payloads via the from_posting_date parameter, which is directly interpolated into the query without proper sanitization or parameter binding.
Erpnext
CVE-2025-66440 Dec 15, 2025
SQLi in Frappe ERPNext 15.89.0 via to_posting_date An issue was discovered in Frappe ERPNext through 15.89.0. Function get_outstanding_reference_documents() at erpnext/accounts/doctype/payment_entry/payment_entry.py is vulnerable to SQL Injection. It allows an attacker to extract arbitrary data from the database by injecting SQL payloads via the to_posting_date parameter, which is directly interpolated into the query without proper sanitization or parameter binding.
Erpnext
CVE-2025-66434 Dec 15, 2025
SSTI in Frappe ERPNext (15.89.0) get_dunning_letter_text allows code exec An SSTI (Server-Side Template Injection) vulnerability exists in the get_dunning_letter_text method of Frappe ERPNext through 15.89.0. The function renders attacker-controlled Jinja2 templates (body_text) using frappe.render_template() with a user-supplied context (doc). Although Frappe uses a custom SandboxedEnvironment, several dangerous globals such as frappe.db.sql are still available in the execution context via get_safe_globals(). An authenticated attacker with access to configure Dunning Type and its child table Dunning Letter Text can inject arbitrary Jinja expressions, resulting in server-side code execution within a restricted but still unsafe context. This can leak database information.
Erpnext
CVE-2025-66435 Dec 15, 2025
SSTI in Frappe ERPNext 15.89.0 get_contract_template: Authenticated RCE An SSTI (Server-Side Template Injection) vulnerability exists in the get_contract_template method of Frappe ERPNext through 15.89.0. The function renders attacker-controlled Jinja2 templates (contract_terms) using frappe.render_template() with a user-supplied context (doc). Although Frappe uses a custom SandboxedEnvironment, several dangerous globals such as frappe.db.sql are still available in the execution context via get_safe_globals(). An authenticated attacker with access to create or modify a Contract Template can inject arbitrary Jinja expressions into the contract_terms field, resulting in server-side code execution within a restricted but still unsafe context. This vulnerability can be used to leak database information.
Erpnext
CVE-2025-67734 Dec 12, 2025
Frappe LMS XSS via Company Website Field < 2.42.0 Frappe Learning Management System (LMS) is a learning system that helps users structure their content. Versions prior to 2.42.0 allowed authenticated attackers to enter JavaScript through the Company Website field of the Job Form, exposing users to an XSS attack. The script could then be executed in the browsers of users who opened the malicious job posting. This issue is fixed in version 2.42.0.
Lms
CVE-2025-67730 Dec 12, 2025
Frappe LMS <2.42.0 Authenticated XSS via Description Fields (CVE-2025-67730) Frappe Learning Management System (LMS) is a learning system that helps users structure their content. Versions prior to 2.42.0 allow authenticated users to add malicious HTML and JavaScript through description fields in the Job, Course and Batch forms. This issue is fixed in version 2.42.0.
Lms
CVE-2025-10655 Dec 09, 2025
SQLi in Frappe HelpDesk 1.14.0 get_dashboard_data SQL Injection in Frappe HelpDesk in the dashboard get_dashboard_data due to unsafe concatenation of user-controlled parameters into dynamic SQL statements.This issue affects Frappe HelpDesk: 1.14.0.
Frappe Helpdesk
CVE-2025-66581 Dec 05, 2025
CVE-2025-66581: Frappe LMS <2.41 Auth Bypass for Low-Priv Users Frappe Learning Management System (LMS) is a learning system that helps users structure their content. Prior to 2.41.0, a flaw in the server-side authorization logic allowed authenticated users to perform actions beyond their assigned roles across multiple features. Because the affected endpoints relied on client-side or UI-level checks instead of enforcing permissions on the server, users with low-privileged roles (such as students) could perform operations intended only for instructors or administrators via directly using the API's. This vulnerability is fixed in 2.41.0.
Lms
CVE-2025-66206 Dec 01, 2025
Frappe Path Traversal via werkzeug/gunicorn, pre 15.86.0/14.99.2 Frappe is a full-stack web application framework. Prior to 15.86.0 and 14.99.2, certain requests were vulnerable to path traversal attacks, wherein some files from the server could be retrieved if the full path was known. Sites hosted on Frappe Cloud, and even other setups that are behind a reverse proxy like NGINX are unaffected. This would mainly affect someone directly using werkzeug/gunicorn. In those cases, either an upgrade or changing the setup to use a reverse proxy is recommended. This vulnerability is fixed in 15.86.0 and 14.99.2.
Frappe
CVE-2025-66205 Dec 01, 2025
SQLi in Frappe 15/14 Endpoints Prior to 15.86.0/14.99.2 (Error-based) Frappe is a full-stack web application framework. Prior to 15.86.0 and 14.99.2, a certain endpoint was vulnerable to error-based SQL injection due to lack of validation of parameters. Some information like version could be retrieved. This vulnerability is fixed in 15.86.0 and 14.99.2.
Frappe
CVE-2025-11461 Nov 26, 2025
SQLi in Frappe CRM 1.53.1 Dashboard Controller via unsafe concat Multiple SQL Injections in Frappe CRM Dashboard Controller due to unsafe concatenation of user-controlled parameters into dynamic SQL statements. This issue affects Frappe CRM: 1.53.1.
Frappe Crm
CVE-2025-64707 Nov 12, 2025
Frappe Learning 2.0-2.40.9 Role Revocation Delay via Cache (CVE-2025-64707) Frappe Learning is a learning system that helps users structure their content. Starting in version 2.0.0 and prior to version 2.41.0, when admins revoked a role from the user, the effect was not immediate because of caching. The issue has been fixed in version 2.41.0 by ensuring the cache is cleared after roles are updated.
Lms
CVE-2025-64705 Nov 12, 2025
Frappe Learning <2.41.0: Unauthorized VIEW Submissions Frappe Learning is a learning system that helps users structure their content. Starting in version 2.0.0 and prior to version 2.41.0, users were able to access the submissions made by other students The issue has been fixed in version 2.41.0 by ensuring proper roles and redirecting if accessed via direct URL.
Lms
CVE-2025-62779 Oct 27, 2025
"Frappe Learning 2.39.1 HTML Injection in Job Form (CVE-2025-62779)" Frappe Learning is a learning system that helps users structure their content. In Frappe Learning 2.39.1 and earlier, users were able to add HTML through input fields in the Job Form.
Lms
CVE-2025-62778 Oct 27, 2025
Frappe Learning <=2.39.1: Quiz Form Access Control Bypass Frappe Learning is a learning management system. A security issue was identified in Frappe Learning 2.39.1 and earlier, where students were able to access the Quiz Form if they had the URL.
Lms
CVE-2025-62407 Oct 16, 2025
Open Redirect via login redirect arg in Frappe before 14.98.0/15.83.0 Frappe is a full-stack web application framework. Prior to 14.98.0 and 15.83.0, an open redirect was possible through the redirect argument on the login page, if a specific type of URL was passed in. This vulnerability is fixed in 14.98.0 and 15.83.0.
Frappe
CVE-2025-62158 Oct 10, 2025
Frappe Learning: Public File Disclosure in Assignment Attachments (pre2.38.0) Frappe Learning is a learning system that helps users structure their content. In versions prior to 2.38.0, the system did stored the attachments uploaded by the students in their assignments as public files. This issue potentially exposed student-uploaded files to the public. Anyone with the file URL could access these files without authentication. The issue has been fixed in version 2.38.0 by ensuring all student-uploaded assignment attachments are stored as private files by default.
CVE-2025-11283 Oct 05, 2025
Frappe LMS XSS in Course Handler (2.35.0) via Description A vulnerability was determined in Frappe LMS 2.35.0. This affects an unknown function of the component Course Handler. Executing manipulation of the argument Description can lead to cross site scripting. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. It is suggested to upgrade the affected component. The vendor was informed early about a total of four security issues and confirmed that those have been fixed. However, the release notes on GitHub do not mention them.
Lms
CVE-2025-11282 Oct 05, 2025
XSS vuln in Frappe LMS 2.35.0 (CVE-2025-11282) A vulnerability was found in Frappe LMS 2.34.x/2.35.0. The impacted element is an unknown function of the component Incomplete Fix CVE-2025-55006. Performing a manipulation results in cross site scripting. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The affected component should be upgraded. The vendor was informed early about a total of four security issues and confirmed that those have been fixed. However, the release notes on GitHub do not mention them.
Lms
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.