CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad

CVEReports
•about 1 hour ago•CVE-2026-35041
4.2

CVE-2026-35041: Regular Expression Denial of Service in fast-jwt

A Regular Expression Denial of Service (ReDoS) vulnerability exists in the fast-jwt Node.js library. Versions 5.0.0 through 6.2.0 fail to validate the complexity of developer-supplied regular expressions used for JSON Web Token claim validation. This allows attackers possessing a validly signed token to trigger catastrophic backtracking in the JavaScript engine, blocking the Node.js event loop and causing a denial of service.

Alon Barad
Alon Barad
2 views•5 min read
•about 3 hours ago•GHSA-JF56-MCCX-5F3F
9.8

GHSA-JF56-MCCX-5F3F: Indirect Prompt Injection and Agent Compromise in OpenClaw Webhooks

The OpenClaw AI framework suffers from a critical indirect prompt injection vulnerability within its webhook processing endpoint. The framework fails to segregate untrusted external payload data from authoritative system instructions, allowing authenticated attackers to execute arbitrary commands, bypass safety guardrails, and exfiltrate sensitive data via the underlying Large Language Model (LLM).

Amit Schendel
Amit Schendel
3 views•6 min read
•about 3 hours ago•GHSA-7437-7HG8-FRRW
9.8

GHSA-7437-7HG8-FRRW: Remote Code Execution via Build Tool Environment Injection in OpenClaw

OpenClaw versions prior to 2026.4.7 are vulnerable to Remote Code Execution (RCE) due to improper neutralization of environment variables during the execution of external build tools. By manipulating variables such as `RUSTC_WRAPPER` or `MAKEFLAGS`, an attacker can hijack the execution flow of child processes to run arbitrary commands.

Alon Barad
Alon Barad
1 views•6 min read
•about 4 hours ago•CVE-2026-20889
9.8

CVE-2026-20889: Heap-based Buffer Overflow in LibRaw X3F Thumbnail Parser

CVE-2026-20889 is a critical heap-based buffer overflow in the LibRaw library triggered by integer overflows during the parsing of Sigma X3F RAW image thumbnails. The vulnerability permits unauthenticated remote code execution.

Alon Barad
Alon Barad
4 views•7 min read
•about 4 hours ago•CVE-2026-20911
9.8

CVE-2026-20911: Remote Code Execution via Heap-Based Buffer Overflow in LibRaw HuffTable::initval

A critical heap-based buffer overflow vulnerability in LibRaw versions up to 0.22.0 allows attackers to execute arbitrary code. The flaw exists in the lossless JPEG decompressor, specifically within the Huffman table initialization routine, due to an incorrect calculation of the required buffer size.

Alon Barad
Alon Barad
3 views•8 min read
•about 4 hours ago•CVE-2026-21413
9.8

CVE-2026-21413: Heap-Based Buffer Overflow in LibRaw Lossless JPEG Decoder

CVE-2026-21413 is a critical heap-based buffer overflow in the LibRaw library, specifically within the `lossless_jpeg_load_raw` function. Triggered by maliciously crafted RAW files, the vulnerability allows for out-of-bounds memory writes due to improper validation of the `col` index in CR2Slice metadata, resulting in an unauthenticated remote code execution vector.

Alon Barad
Alon Barad
3 views•4 min read
•about 5 hours ago•CVE-2026-39882
5.3

CVE-2026-39882: Memory Exhaustion Denial of Service in OpenTelemetry-Go OTLP HTTP Exporters

OpenTelemetry-Go prior to version 1.43.0 suffers from an uncontrolled resource consumption vulnerability in its OTLP HTTP exporters. This flaw allows attackers controlling a telemetry collector or performing a Man-in-the-Middle attack to exhaust application memory via excessively large HTTP response bodies.

Amit Schendel
Amit Schendel
2 views•6 min read
•about 5 hours ago•CVE-2026-39883
7.3

CVE-2026-39883: PATH Hijacking via Insecure kenv Execution in OpenTelemetry Go SDK

The OpenTelemetry Go SDK contains an Untrusted Search Path vulnerability (CWE-426) affecting BSD and Solaris systems. The SDK fails to use an absolute path when executing the system `kenv` utility during host identification. This oversight allows a local attacker to achieve arbitrary code execution by manipulating the PATH environment variable.

Alon Barad
Alon Barad
6 views•5 min read
•about 6 hours ago•CVE-2026-39885
7.5

CVE-2026-39885: Server-Side Request Forgery and Local File Inclusion in FrontMCP mcp-from-openapi

A high-severity vulnerability exists in the `mcp-from-openapi` library of the FrontMCP framework. Versions prior to 2.3.0 fail to restrict protocol schemes and network destinations when dereferencing OpenAPI `$ref` pointers. This flaw allows unauthenticated Server-Side Request Forgery (SSRF) and Local File Inclusion (LFI), enabling attackers to access internal network services, cloud metadata endpoints, and arbitrary local files.

Amit Schendel
Amit Schendel
8 views•6 min read
•about 6 hours ago•CVE-2026-39901
5.7

CVE-2026-39901: Authorization Bypass and Transaction Integrity Flaw in monetr

monetr budgeting application prior to version 1.12.3 contains an authorization bypass flaw. Authenticated tenant users can soft-delete immutable 'synced' transactions by injecting the `deletedAt` field into the update (PUT) API payload, bypassing restrictions on the standard DELETE endpoint.

Alon Barad
Alon Barad
4 views•7 min read
•about 7 hours ago•CVE-2026-39892
6.9

CVE-2026-39892: Out-of-bounds Read in Python Cryptography via Non-Contiguous Buffers

CVE-2026-39892 is a memory safety vulnerability within the Python cryptography package affecting versions 45.0.0 through 46.0.6. The flaw occurs due to improper handling of non-contiguous memory buffers passed through the Python Buffer Protocol, resulting in an out-of-bounds memory read when using Python 3.11 or later.

Amit Schendel
Amit Schendel
3 views•6 min read
•about 7 hours ago•GHSA-XRW6-GWF8-VVR9
7.1

GHSA-XRW6-GWF8-VVR9: Signal Spoofing and Resource Exhaustion in Tmds.DBus

The GHSA-XRW6-GWF8-VVR9 vulnerability identifies multiple high-severity flaws in the Tmds.DBus and Tmds.DBus.Protocol .NET libraries. These components fail to properly authenticate the sender of D-Bus signals and mishandle file descriptor lifecycle operations during message parsing. A local unprivileged attacker connected to the D-Bus system or session bus can exploit these issues to execute denial-of-service attacks or manipulate application logic via spoofed signals.

Amit Schendel
Amit Schendel
4 views•6 min read
SeverityExploitPeriodCatalog
Sort

Or generate a custom report

Search for a CVE ID (e.g. CVE-2024-1234) to generate an AI-powered vulnerability analysis

Automated vulnerability intelligence. 1,430+ reports.