Total CVEs

125,574

Critical Severity

2,253

High Severity

7,771

Last 7 Days

1,108
Quick preset (or use dates below)
Clear Filters
๐Ÿ“… Showing Year: 2026 (January 1 - December 31, 2026) View All Years โ†’
Showing 321 - 340 of 21,979 CVEs
CVE-2026-7199 HIGH - 7.3

A vulnerability was detected in SourceCodester Pharmacy Sales and Inventory System 1.0. Affected by this vulnerability is an unknown functionality of the file /ajax.php?action=delete_product. Performing a manipulation of the argument ID results in sql injection. It is possible to initiate the attack...

Published: Apr 28, 2026
Source: NVD
CVE-2026-7196 MEDIUM - 6.3

A security vulnerability has been detected in CodeAstro Online Classroom 1.0. Affected is an unknown function of the file /guestdetails. Such manipulation of the argument deleteid leads to sql injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used...

Published: Apr 28, 2026
Source: NVD
CVE-2026-41372 MEDIUM - 5.8

OpenClaw before 2026.4.2 fails to normalize trailing-dot localhost hosts in remote CDP discovery responses, allowing bypass of loopback protections. Attackers can craft hostile discovery responses returning localhost. to retarget authenticated browser control toward localhost endpoints and expose br...

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD
CVE-2026-41371 HIGH - 8.5

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in chat.send that allows write-scoped gateway callers to trigger admin-only session reset operations. Attackers can rotate target sessions, archive prior transcript state, and force new session IDs without requiring admin scope ...

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD
CVE-2026-41370 MEDIUM - 6.5

OpenClaw before 2026.3.31 contains a path traversal vulnerability in ACP dispatch that allows attackers to read arbitrary files by manipulating inbound channel attachment paths. Remote attackers can bypass attachment-cache and root directory checks to access files outside intended directories.

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD
CVE-2026-41369 MEDIUM - 6.5

OpenClaw before 2026.3.31 contains insufficient environment variable sanitization in host exec operations, failing to filter package, registry, Docker, compiler, and TLS override variables. Attackers can exploit this by injecting malicious environment variables to override critical system configurat...

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD
CVE-2026-41368 MEDIUM - 6.5

OpenClaw before 2026.3.28 contains an environment variable disclosure vulnerability in the jq safe-bin policy that fails to block the $ENV filter. Attackers can bypass safe-bin restrictions by using $ENV in jq programs to access sensitive environment variables that should be restricted.

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD
CVE-2026-41367 MEDIUM - 5.0

OpenClaw versions 2026.2.14 through 2026.3.24 fail to consistently apply guild and channel policy gates to Discord button and component interactions. Attackers can trigger privileged component actions from blocked contexts by bypassing channel policy enforcement.

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD
CVE-2026-41366 MEDIUM - 5.5

OpenClaw before 2026.3.31 contains a local roots self-whitelisting vulnerability in appendLocalMediaParentRoots that allows model-initiated arbitrary host file read. Attackers can exploit improper media parent directory validation to exfiltrate credentials and access sensitive files.

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD
CVE-2026-41365 MEDIUM - 5.4

OpenClaw before 2026.3.31 contains a sender allowlist bypass vulnerability in MS Teams thread history fetched via Graph API. Attackers can retrieve thread messages that should be filtered by sender allowlists, bypassing message filtering restrictions.

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD
CVE-2026-41364 HIGH - 8.1

OpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sandbox tar upload that allows remote attackers to write arbitrary files. Attackers can exploit this by uploading tar archives containing symlinks to escape the sandbox and overwrite files on the remote host.

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD
CVE-2026-41363 MEDIUM - 5.3

OpenClaw versions 2026.2.6 through 2026.3.24 contain a path traversal vulnerability in the Feishu extension resolveUploadInput function that bypasses file-system sandbox restrictions. Attackers can exploit improper path resolution during upload_image operations to read arbitrary files outside config...

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD
CVE-2026-41362 MEDIUM - 4.3

OpenClaw versions 2026.2.19 before 2026.3.31 contain an improper cache isolation vulnerability in the Zalo webhook replay-dedupe mechanism that is shared across authenticated webhook targets. Attackers controlling one authenticated Zalo webhook path in multi-account deployments can suppress legitima...

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD
CVE-2026-40977 MEDIUM - 4.7

When an application is configured to use `ApplicationPidFileWriter`, a local attacker with write access to the PID file's location can corrupt one file on the host each time the application is started. Affected: Spring Boot 4.0.0โ€“4.0.5 (fix 4.0.6), 3.5.0โ€“3.5.13 (fix 3.5.14), 3.4.0โ€“3.4.15 (fix ...

Vendor: Spring
Product: Spring Boot
Published: Apr 28, 2026
Source: NVD
CVE-2026-40976 CRITICAL - 9.1

In certain circumstances, Spring Boot's default web security is ineffective allowing unauthorized access to all endpoints. For an application to be vulnerable, it must: be a servlet-based web application; have no Spring Security configuration of its own and rely on the default web security filt...

Vendor: Spring
Product: Spring Boot
Published: Apr 28, 2026
Source: NVD
CVE-2026-40975 MEDIUM - 4.8

Values produced by ${random.value} are not suitable for use as secrets. ${random.uuid} is not affected. ${random.int} and ${random.long} should never be used for secrets as they are numeric values with a predictable range. Affected: Spring Boot 4.0.0โ€“4.0.5 (fix 4.0.6), 3.5.0โ€“3.5.13 (fix 3.5.14), 3....

Vendor: Spring
Product: Spring Boot
Published: Apr 28, 2026
Source: NVD
CVE-2026-40974 MEDIUM - 5.0

Spring Boot's Cassandra auto-configuration does not perform hostname verification when establishing an SSL connection to Cassandra. Affected: Spring Boot 4.0.0โ€“4.0.5 (fix 4.0.6), 3.5.0โ€“3.5.13 (fix 3.5.14), 3.4.0โ€“3.4.15 (fix 3.4.16), 3.3.0โ€“3.3.18 (fix 3.3.19), 2.7.0โ€“2.7.32 (fix 2.7.33); Cassand...

Vendor: Spring
Product: Spring Boot
Published: Apr 28, 2026
Source: NVD
CVE-2026-40973 HIGH - 7.0

A local attacker on the same host as the application may be able to take control of the directory used by `ApplicationTemp`. When `server.servlet.session.persistent` is set to `true` and the attack persists across application restarts, this may allow the attacker to read session information and hija...

Vendor: Spring
Product: Spring Boot
Published: Apr 28, 2026
Source: NVD
CVE-2026-40972 HIGH - 7.5

An attacker on the same network as the remote application may be able to utilize a timing attack to discover information about the remote secret. In extreme circumstances this could result in the attacker determining the secret and uploading changed classes, thereby achieving remote code execution i...

Vendor: Spring
Product: Spring Boot
Published: Apr 28, 2026
Source: NVD
CVE-2026-27785 HIGH - 8.8

Specific firmware versions of Milesight AIOT camera firmware contain hard-coded credentials.

Published: Apr 28, 2026
Source: NVD