CVE Database

Search and browse vulnerability records from NVD

Showing 50 of 138729 CVEs

CVE ID Severity Description EPSS Published
3.7 LOW

Webpack is a module bundler. From version 5.49.0 to before 5.104.0, when experiments.buildHttp is enabled, webpack’s HTTP(S) resolver (HttpUriPlugin) enforces allowedUris only for the initial URL, but does not re-validate allowedUris after following HTTP 30x redirects. As a result, an import that appears restricted to a trusted allow-list can be redirected to HTTP(S) URLs outside the allow-list. This is a policy/allow-list bypass that enables build-time SSRF behavior (requests from the build machine to internal-only endpoints, depending on network access) and untrusted content inclusion in build outputs (redirected content is treated as module source and bundled). This issue has been patched in version 5.104.0.

0.0% 2026-02-05
6.5 MEDIUM

AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Prior to autogpt-platform-beta-v0.6.32, there is a DoS vulnerability in ReadRSSFeedBlock. In RSSBlock, feedparser.parser is called to obtain the XML file according to the URL input by the user, parse the XML, and finally obtain the parsed result. However, during the parsing process, there is no limit on the parsing time and the resources that can be allocated for parsing. When a malicious user lets RSSBlock parse a carefully constructed, deep XML, it will cause memory resources to be exhausted, eventually causing DoS. This issue has been patched in autogpt-platform-beta-v0.6.32.

0.0% 2026-02-05
3.2 LOW

Fortinet FortiOS through 7.6.6 allows attackers to decrypt LDAP credentials stored in device configuration files, as exploited in the wild from 2025-12-16 through 2026 (by default, the encryption key is the same across all customers' installations). NOTE: the Supplier's position is that the instance of CWE-1394 is not a vulnerability because customers "are supposed to enable" a non-default option that eliminates the weakness. However, that non-default option can disrupt functionality as shown in the "Managing FortiGates with private data encryption" document, and is therefore intentionally not a default option.

0.0% 2026-02-05
3.5 LOW

A flaw has been found in Edimax BR-6258n up to 1.18. This issue affects the function formStaDrvSetup of the file /goform/formStaDrvSetup. This manipulation of the argument submit-url causes open redirect. The attack can be initiated remotely. The exploit has been published and may be used. The vendor confirms that the affected product is end-of-life. They confirm that they "will issue a consolidated Security Advisory on our official support website." This vulnerability only affects products that are no longer supported by the maintainer.

0.0% 2026-02-05
4.3 MEDIUM

A vulnerability was determined in WeKan up to 8.20. This impacts an unknown function of the file models/boards.js of the component REST Endpoint. This manipulation causes improper access controls. Remote exploitation of the attack is possible. Upgrading to version 8.21 will fix this issue. Patch name: 545566f5663545d16174e0f2399f231aa693ab6e. It is advisable to upgrade the affected component.

0.1% 2026-02-05
6.3 MEDIUM

A vulnerability was found in WeKan up to 8.20. This affects an unknown function of the file models/attachments.js of the component Attachment Storage. The manipulation results in improper access controls. The attack may be launched remotely. Upgrading to version 8.21 mitigates this issue. The patch is identified as c413a7e860bc4d93fe2adcf82516228570bf382d. Upgrading the affected component is advised.

0.0% 2026-02-05
6.3 MEDIUM

A vulnerability has been found in WeKan up to 8.20. The impacted element is an unknown function of the file server/attachmentMigration.js of the component Attachment Migration. The manipulation leads to improper access controls. The attack may be initiated remotely. Upgrading to version 8.21 is sufficient to resolve this issue. The identifier of the patch is 053bf1dfb76ef230db162c64a6ed50ebedf67eee. It is recommended to upgrade the affected component.

0.0% 2026-02-05
9.3 CRITICAL

In vpu_mmap of vpu_ioctl, there is a possible arbitrary address mmap due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

0.0% 2026-02-05
6.5 MEDIUM

A truncated 802.15.4 packet can lead to an assert, resulting in a denial of service.

0.0% 2026-02-05
N/A

Rejected reason: Reason: This candidate was issued in error.

- 2026-02-05
N/A

In builds with PubSub and JSON enabled, a crafted JSON message can cause the decoder to write beyond a heap-allocated array before authentication, reliably crashing the process and corrupting memory.

0.0% 2026-02-05
6.5 MEDIUM

Tanium addressed an incorrect default permissions vulnerability in Enforce.

0.0% 2026-02-05
4.3 MEDIUM

Tanium addressed an improper access controls vulnerability in Reputation.

0.0% 2026-02-05
6.5 MEDIUM

Tanium addressed an incorrect default permissions vulnerability in Benchmark.

0.0% 2026-02-05
6.5 MEDIUM

Tanium addressed an incorrect default permissions vulnerability in Comply.

0.0% 2026-02-05
6.5 MEDIUM

Tanium addressed an incorrect default permissions vulnerability in Discover.

0.0% 2026-02-05
6.5 MEDIUM

Tanium addressed an incorrect default permissions vulnerability in Partner Integration.

0.0% 2026-02-05
6.5 MEDIUM

Tanium addressed an incorrect default permissions vulnerability in Patch.

0.0% 2026-02-05
6.5 MEDIUM

Tanium addressed an incorrect default permissions vulnerability in Performance.

0.0% 2026-02-05
4.3 MEDIUM

Tanium addressed an information disclosure vulnerability in Threat Response.

0.0% 2026-02-05
4.3 MEDIUM

Tanium addressed an information disclosure vulnerability in Threat Response.

0.0% 2026-02-05
4.3 MEDIUM

Tanium addressed an information disclosure vulnerability in Threat Response.

0.0% 2026-02-05
4.9 MEDIUM

Tanium addressed an information disclosure vulnerability in Threat Response.

0.0% 2026-02-05
4.3 MEDIUM

Tanium addressed an uncontrolled resource consumption vulnerability in Connect.

0.0% 2026-02-05
8.8 HIGH

Tanium addressed an improper input validation vulnerability in Deploy.

0.0% 2026-02-05
4.9 MEDIUM

Tanium addressed an information disclosure vulnerability in Threat Response.

0.0% 2026-02-05
5.0 MEDIUM

Tanium addressed an improper link resolution before file access vulnerability in Enforce.

0.0% 2026-02-05
4.3 MEDIUM

Tanium addressed an improper access controls vulnerability in Deploy.

0.0% 2026-02-05
4.3 MEDIUM

Tanium addressed an improper access controls vulnerability in Patch.

0.0% 2026-02-05
6.3 MEDIUM

Tanium addressed an improper input validation vulnerability in Discover.

0.0% 2026-02-05
6.6 MEDIUM

Tanium addressed a documentation issue in Engage.

0.0% 2026-02-05
3.7 LOW

Tanium addressed an improper certificate validation vulnerability in Tanium Appliance.

0.0% 2026-02-05
2.7 LOW

Tanium addressed an improper input validation vulnerability in Tanium Appliance.

0.0% 2026-02-05
6.6 MEDIUM

Tanium addressed an improper output sanitization vulnerability in Tanium Appliance.

0.0% 2026-02-05
7.8 HIGH

Tanium addressed an unauthorized code execution vulnerability in Tanium Appliance.

0.0% 2026-02-05
3.1 LOW

Tanium addressed an improper access controls vulnerability in Interact.

0.0% 2026-02-05
7.4 HIGH

pgAdmin versions 9.11 are affected by a Restore restriction bypass via key disclosure vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. An attacker with access to the pgAdmin web interface can observe an active restore operation, extract the `\restrict` key in real time, and race the restore process by overwriting the restore script with a payload that re-enables meta-commands using `\unrestrict <key>`. This results in reliable command execution on the pgAdmin host during the restore operation.

0.0% 2026-02-05
7.2 HIGH

An issue in ChestnutCMS v.1.5.8 and before allows a remote attacker to execute arbitrary code via the template creation function

0.5% 2026-02-05
10.0 CRITICAL

During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.

0.0% 2026-02-05
5.3 MEDIUM

The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.

0.0% 2026-02-05
5.3 MEDIUM

The html.Parse function in golang.org/x/net/html has quadratic parsing complexity when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.

0.0% 2026-02-05
8.8 HIGH

An Improper Certificate Validation vulnerability in TP-Link Tapo H100 v1 and Tapo P100 v1 allows an on-path attacker on the same network segment to intercept and modify encrypted device-cloud communications.  This may compromise the confidentiality and integrity of device-to-cloud communication, enabling manipulation of device data or operations.

0.0% 2026-02-05
5.6 MEDIUM

The response coming from TP-Link Archer MR200 v5.2, C20 v5 and v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. Attackers can exploit this vulnerability via a Man-in-the-Middle (MitM) attack to execute JavaScript code on the router's admin web portal without the user's permission or knowledge.

0.0% 2026-02-05
6.8 MEDIUM

Moxa Arm-based industrial computers running Moxa Industrial Linux Secure use a device-unique bootloader password provided on the device. An attacker with physical access to the device could use this information to access the bootloader menu via a serial interface.  Access to the bootloader menu does not allow full system takeover or privilege escalation. The bootloader enforces digital signature verification and only permits flashing of Moxa-signed images. As a result, an attacker cannot install malicious firmware or execute arbitrary code. The primary impact is limited to a potential temporary denial-of-service condition if a valid image is reflashed. Remote exploitation is not possible.

0.0% 2026-02-05
6.8 MEDIUM

A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3, where the discrete TPM is connected to the CPU via an SPI bus. Exploitation requires invasive physical access, including opening the device and attaching external equipment to the SPI bus to capture TPM communications. If successful, the captured data may allow offline decryption of eMMC contents. This attack cannot be performed through brief or opportunistic physical access and requires extended physical access, possession of the device, appropriate equipment, and sufficient time for signal capture and analysis. Remote exploitation is not possible.

0.0% 2026-02-05
6.1 MEDIUM

Cross Site Scripting vulnerability in the "/admin/category/create" endpoint of Microweber 2.0.19. An attacker can manipulate the "rel_id" parameter in a crafted URL and lure a user with admin privileges into visiting it, achieving JavaScript code execution in the victim's browser. The issue was reported to the developers and fixed in version 2.0.20.

0.0% 2026-02-05
6.1 MEDIUM

Cross Site Scripting vulnerability in the "/admin/order/abandoned" endpoint of Microweber 2.0.19. An attacker can manipulate the "orderDirection" parameter in a crafted URL and lure a user with admin privileges into visiting it, achieving JavaScript code execution in the victim's browser. The issue was reported to the developers and fixed in version 2.0.20.

0.0% 2026-02-05
8.8 HIGH

Monstra CMS v3.0.4 contains an arbitrary file upload vulnerability in the Files Manager plugin. The application relies on blacklist-based file extension validation and stores uploaded files directly in a web-accessible directory. Under typical server configurations, this can allow an attacker to upload files that are interpreted as executable code, resulting in remote code execution.

0.1% 2026-02-05
5.5 MEDIUM

A path traversal in My Text Editor v1.6.2 allows attackers to cause a Denial of Service (DoS) via writing files to the internal storage.

0.0% 2026-02-05
9.0 CRITICAL

Axigen Mail Server before 10.5.57 contains multiple stored Cross-Site Scripting (XSS) vulnerabilities in the WebAdmin interface. Three instances exist: (1) the log file name parameter in the Local Services Log page, (2) certificate file content in the SSL Certificates View Usage feature, and (3) the Certificate File name parameter in the WebMail Listeners SSL settings. Attackers can inject malicious JavaScript payloads that execute in administrators' browsers when they access affected pages or features, enabling privilege escalation attacks where low-privileged admins can force high-privileged admins to perform unauthorized actions.

0.0% 2026-02-05