radar

ONE Sentinel

shield

CVE Tracker

96,709 total CVEs

Live vulnerability feed from the National Vulnerability Database

6.5

AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Prior to autogpt-platform-beta-v0.6.32, there is a DoS vulnerability in ReadRSSFeedBlock. In RSSBlock, feedparser.parser is called to obtain the XML file according to the URL input by the user, parse the XML, and finally obtain the parsed result. However, during the parsing process, there is no limit on the parsing time and the resources that can be allocated for parsing. When a malicious user lets RSSBlock parse a carefully constructed, deep XML, it will cause memory resources to be exhausted, eventually causing DoS. This issue has been patched in autogpt-platform-beta-v0.6.32.

3.2

Fortinet FortiOS through 7.6.6 allows attackers to decrypt LDAP credentials stored in device configuration files, as exploited in the wild from 2025-12-16 through 2026 (by default, the encryption key is the same across all customers' installations). NOTE: the Supplier's position is that the instance of CWE-1394 is not a vulnerability because customers "are supposed to enable" a non-default option that eliminates the weakness. However, that non-default option can disrupt functionality as shown in the "Managing FortiGates with private data encryption" document, and is therefore intentionally not a default option.

3.5

A flaw has been found in Edimax BR-6258n up to 1.18. This issue affects the function formStaDrvSetup of the file /goform/formStaDrvSetup. This manipulation of the argument submit-url causes open redirect. The attack can be initiated remotely. The exploit has been published and may be used. The vendor confirms that the affected product is end-of-life. They confirm that they "will issue a consolidated Security Advisory on our official support website." This vulnerability only affects products that are no longer supported by the maintainer.

4.3

A vulnerability was determined in WeKan up to 8.20. This impacts an unknown function of the file models/boards.js of the component REST Endpoint. This manipulation causes improper access controls. Remote exploitation of the attack is possible. Upgrading to version 8.21 will fix this issue. Patch name: 545566f5663545d16174e0f2399f231aa693ab6e. It is advisable to upgrade the affected component.

6.3

A vulnerability was found in WeKan up to 8.20. This affects an unknown function of the file models/attachments.js of the component Attachment Storage. The manipulation results in improper access controls. The attack may be launched remotely. Upgrading to version 8.21 mitigates this issue. The patch is identified as c413a7e860bc4d93fe2adcf82516228570bf382d. Upgrading the affected component is advised.

6.3

A vulnerability has been found in WeKan up to 8.20. The impacted element is an unknown function of the file server/attachmentMigration.js of the component Attachment Migration. The manipulation leads to improper access controls. The attack may be initiated remotely. Upgrading to version 8.21 is sufficient to resolve this issue. The identifier of the patch is 053bf1dfb76ef230db162c64a6ed50ebedf67eee. It is recommended to upgrade the affected component.

9.3

In vpu_mmap of vpu_ioctl, there is a possible arbitrary address mmap due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

6.5

A truncated 802.15.4 packet can lead to an assert, resulting in a denial of service.

N/A

Rejected reason: Reason: This candidate was issued in error.

6.8

In builds with PubSub and JSON enabled, a crafted JSON message can cause the decoder to write beyond a heap-allocated array before authentication, reliably crashing the process and corrupting memory.

6.5

Tanium addressed an incorrect default permissions vulnerability in Enforce.

4.3

Tanium addressed an improper access controls vulnerability in Reputation.

6.5

Tanium addressed an incorrect default permissions vulnerability in Benchmark.

6.5

Tanium addressed an incorrect default permissions vulnerability in Comply.

6.5

Tanium addressed an incorrect default permissions vulnerability in Discover.

6.5

Tanium addressed an incorrect default permissions vulnerability in Partner Integration.

6.5

Tanium addressed an incorrect default permissions vulnerability in Patch.

6.5

Tanium addressed an incorrect default permissions vulnerability in Performance.

4.3

Tanium addressed an information disclosure vulnerability in Threat Response.

4.3

Tanium addressed an information disclosure vulnerability in Threat Response.

4.3

Tanium addressed an information disclosure vulnerability in Threat Response.

4.9

Tanium addressed an information disclosure vulnerability in Threat Response.

4.3

Tanium addressed an uncontrolled resource consumption vulnerability in Connect.

8.8

Tanium addressed an improper input validation vulnerability in Deploy.

4.9

Tanium addressed an information disclosure vulnerability in Threat Response.

Showing 15276-15300 of 96,709 CVEs