A Regular Expression Denial of Service (ReDoS) vulnerability exists in the fast-jwt Node.js library. Versions 5.0.0 through 6.2.0 fail to validate the complexity of developer-supplied regular expressions used for JSON Web Token claim validation. This allows attackers possessing a validly signed token to trigger catastrophic backtracking in the JavaScript engine, blocking the Node.js event loop and causing a denial of service.
The OpenClaw AI framework suffers from a critical indirect prompt injection vulnerability within its webhook processing endpoint. The framework fails to segregate untrusted external payload data from authoritative system instructions, allowing authenticated attackers to execute arbitrary commands, bypass safety guardrails, and exfiltrate sensitive data via the underlying Large Language Model (LLM).
OpenClaw versions prior to 2026.4.7 are vulnerable to Remote Code Execution (RCE) due to improper neutralization of environment variables during the execution of external build tools. By manipulating variables such as `RUSTC_WRAPPER` or `MAKEFLAGS`, an attacker can hijack the execution flow of child processes to run arbitrary commands.
CVE-2026-20889 is a critical heap-based buffer overflow in the LibRaw library triggered by integer overflows during the parsing of Sigma X3F RAW image thumbnails. The vulnerability permits unauthenticated remote code execution.
A critical heap-based buffer overflow vulnerability in LibRaw versions up to 0.22.0 allows attackers to execute arbitrary code. The flaw exists in the lossless JPEG decompressor, specifically within the Huffman table initialization routine, due to an incorrect calculation of the required buffer size.
CVE-2026-21413 is a critical heap-based buffer overflow in the LibRaw library, specifically within the `lossless_jpeg_load_raw` function. Triggered by maliciously crafted RAW files, the vulnerability allows for out-of-bounds memory writes due to improper validation of the `col` index in CR2Slice metadata, resulting in an unauthenticated remote code execution vector.
OpenTelemetry-Go prior to version 1.43.0 suffers from an uncontrolled resource consumption vulnerability in its OTLP HTTP exporters. This flaw allows attackers controlling a telemetry collector or performing a Man-in-the-Middle attack to exhaust application memory via excessively large HTTP response bodies.
The OpenTelemetry Go SDK contains an Untrusted Search Path vulnerability (CWE-426) affecting BSD and Solaris systems. The SDK fails to use an absolute path when executing the system `kenv` utility during host identification. This oversight allows a local attacker to achieve arbitrary code execution by manipulating the PATH environment variable.
A high-severity vulnerability exists in the `mcp-from-openapi` library of the FrontMCP framework. Versions prior to 2.3.0 fail to restrict protocol schemes and network destinations when dereferencing OpenAPI `$ref` pointers. This flaw allows unauthenticated Server-Side Request Forgery (SSRF) and Local File Inclusion (LFI), enabling attackers to access internal network services, cloud metadata endpoints, and arbitrary local files.
monetr budgeting application prior to version 1.12.3 contains an authorization bypass flaw. Authenticated tenant users can soft-delete immutable 'synced' transactions by injecting the `deletedAt` field into the update (PUT) API payload, bypassing restrictions on the standard DELETE endpoint.
CVE-2026-39892 is a memory safety vulnerability within the Python cryptography package affecting versions 45.0.0 through 46.0.6. The flaw occurs due to improper handling of non-contiguous memory buffers passed through the Python Buffer Protocol, resulting in an out-of-bounds memory read when using Python 3.11 or later.
The GHSA-XRW6-GWF8-VVR9 vulnerability identifies multiple high-severity flaws in the Tmds.DBus and Tmds.DBus.Protocol .NET libraries. These components fail to properly authenticate the sender of D-Bus signals and mishandle file descriptor lifecycle operations during message parsing. A local unprivileged attacker connected to the D-Bus system or session bus can exploit these issues to execute denial-of-service attacks or manipulate application logic via spoofed signals.
Or generate a custom report
Search for a CVE ID (e.g. CVE-2024-1234) to generate an AI-powered vulnerability analysis
Automated vulnerability intelligence. 1,430+ reports.