The Auth0 WordPress plugin (versions 5.0.0-BETA0 through 5.5.0) and its underlying Auth0-PHP SDK (versions 8.0.0 through 8.18.0) suffer from a cryptographic flaw due to insufficient entropy in session cookie encryption. This weakness permits attackers to brute-force the encryption key offline, forge malicious session cookies, and trigger insecure deserialization upon processing by the server. Successful exploitation allows authenticated attackers to execute arbitrary code within the context of the WordPress instance.
The Auth0 Symfony SDK (versions 5.0.0 through 5.7.0) is vulnerable to an insufficient entropy flaw in its cookie encryption implementation, stemming from the underlying auth0/auth0-php library. This allows an attacker to brute-force session keys and forge valid authentication cookies.
A prototype pollution vulnerability in DOMPurify allows attackers to bypass the HTML sanitizer's attribute allowlist when the USE_PROFILES configuration is enabled. This results in DOM-based Cross-Site Scripting (XSS) via injected event handlers.
Foxit PDF Editor and PDF Reader contain a critical use-after-free vulnerability within the list box calculate array logic. This flaw allows an attacker to execute arbitrary code by manipulating the lifecycle of document form fields and pages via crafted AcroJS scripts.
DOMPurify versions prior to 3.3.2 contain a vulnerability where the ADD_ATTR predicate function short-circuits internal validation logic. This allows dynamically approved attributes to bypass URI-safe sanitization, potentially leading to DOM-based Cross-Site Scripting (XSS) via dangerous protocols like javascript: or data:.
A critical authentication bypass vulnerability in the Cisco Integrated Management Controller (IMC) allows an unauthenticated, remote attacker to reset administrative passwords. The flaw exists due to improper input validation in the user credential update process within the XML API and web management interface.
Signal K Server prior to version 2.24.0 contains an input validation flaw in its JSON-patch endpoint. The application fails to validate the `from` field during copy and move operations, allowing authenticated users to read sensitive properties from the global prototype object.
OpenSTAManager versions prior to 2.10.2 contain a high-severity SQL Injection vulnerability in the `Aggiornamenti` module. The application accepts raw SQL statements in JSON format and executes them directly against the database without validation. This flaw enables authenticated attackers to modify database schemas, exfiltrate data, and potentially achieve remote code execution depending on database configuration.
Nginx UI prior to version 2.3.4 contains a critical cryptographic design flaw in its backup and restore mechanism. The application relies on a circular trust model where backup integrity is protected by user-controlled encryption keys, allowing an attacker to forge backup archives and achieve Remote Code Execution upon restoration.
OpenClaw versions prior to v2026.3.31 contain an environment variable injection vulnerability in the Host Environment Security Policy. An untrusted AI model can achieve arbitrary code execution on the host by supplying specific un-sanitized compiler environment variables during host-exec operations.
OpenClaw versions 2026.3.28 and earlier contain an improper authorization vulnerability in the Matrix extension. The application fails to validate the sender of threaded messages or reply contexts against the configured allowlist. This allows unauthorized attackers to inject arbitrary content into the AI assistant's context window when an authorized user interacts with an attacker's message.
The OpenClaw personal AI assistant platform contains a resource exhaustion vulnerability in its LINE webhook handler. The application fails to enforce concurrency limits prior to processing unauthenticated HTTP POST requests, allowing an attacker to cause a Denial of Service (DoS) through rapid CPU and memory consumption.
Or generate a custom report
Search for a CVE ID (e.g. CVE-2024-1234) to generate an AI-powered vulnerability analysis
Automated vulnerability intelligence. 1,355+ reports.