Directus failed to consistently sanitize sensitive fields before storing them in the `directus_revisions` table and logging them in Directus Flows. This allowed authentication tokens, 2FA secrets, and third-party API keys to be exposed in plaintext, potentially leading to account takeover or external API abuse.
Directus versions prior to 11.17.0 are vulnerable to an unauthenticated Denial of Service (DoS) attack. The vulnerability arises from a lack of request-scoped deduplication in the GraphQL API, allowing attackers to exploit GraphQL alias amplification against resource-intensive resolvers such as the system health check.
OpenClaw versions prior to 2026.4.2 contain a security parameter isolation violation in the Gemini OAuth flow. The application incorrectly reuses the PKCE code_verifier as the value for the OAuth state parameter, exposing the secret verifier in plaintext via the redirect URI and defeating PKCE protections.
A Server-Side Request Forgery (SSRF) vulnerability exists in the web3.py library due to the default-enabled implementation of EIP-3668 (CCIP Read). The library performs unvalidated HTTP GET and POST requests to URLs supplied by untrusted smart contracts during OffchainLookup revert operations.
A high-severity signed integer overflow vulnerability in the OpenEXR library's B44 and B44A compression modules allows for out-of-bounds memory writes. This flaw can be triggered during the encoding or decoding of maliciously crafted EXR files, potentially resulting in denial of service or arbitrary code execution.
A critical heap information disclosure vulnerability in OpenEXR allows remote attackers to leak uninitialized heap memory contents via maliciously crafted EXR files. The flaw exists in the PXR24 decompression logic, where missing bounds checks on truncated zlib streams lead to out-of-bounds reads during image reconstruction.
CVE-2026-34824 is a high-severity denial-of-service vulnerability in the Mesop Python UI framework. Versions 1.2.3 and 1.2.4 fail to implement resource constraints within the WebSocket message handler, allowing unauthenticated remote attackers to trigger unbounded OS thread creation and cause complete system availability loss.
Budibase versions prior to 3.33.4 contain a critical OS command injection vulnerability within the platform's bash automation step. An authenticated attacker with privileges to create or modify automations can inject shell metacharacters, leading to unauthenticated remote code execution on the host system.
CVE-2026-32145 is a high-severity Denial of Service vulnerability in the Wisp web framework for the Gleam programming language. Unauthenticated remote attackers can bypass configured max_body_size and max_files_size limits during multipart/form-data parsing to exhaust memory or disk space.
The Auth0 Laravel SDK (auth0/login) suffers from a cryptographic vulnerability due to insufficient entropy in its cookie encryption mechanism. This weakness permits threat actors to brute-force session encryption keys offline, enabling the forgery of session cookies and leading to complete account takeover.
Juju versions 2.9 (prior to 2.9.56) and 3.6 (prior to 3.6.19) suffer from an incorrect authorization vulnerability in the API server. An attacker compromising a single workload machine can use local agent credentials to bypass model isolation and stream debug logs across the entire deployment, including the central controller.
A critical incorrect authorization vulnerability in the Juju apiserver resource management endpoint allows low-privileged, authenticated entities to bypass model boundaries. Attackers can perform cross-model resource poisoning by uploading malicious payloads, leading to remote code execution on target workloads.
Or generate a custom report
Search for a CVE ID (e.g. CVE-2024-1234) to generate an AI-powered vulnerability analysis
Automated vulnerability intelligence. 1,367+ reports.