Total CVEs

125,862

Critical Severity

2,275

High Severity

7,879

Last 7 Days

1,162
Quick preset (or use dates below)
Clear Filters
📅 Showing Year: 2026 (January 1 - December 31, 2026) View All Years →
Showing 441 - 460 of 7,579 CVEs
CVE-2026-35064 HIGH - 7.5

A vulnerability in SenseLive X3050’s management ecosystem allows unauthenticated discovery of deployed units through the vendor’s management protocol, enabling identification of device presence, identifiers, and management interfaces without requiring credentials. Because discovery functions are exp...

Vendor: SenseLive
Product: X3050
Published: Apr 24, 2026
Source: NVD
CVE-2026-31952 HIGH - 7.6

Xibo is an open source digital signage platform with a web content management system and Windows display player software. Versions 1.7 through 4.4.0 have an SQL injection vulnerability in the API routes inside the CMS responsible for Filtering DataSets. This allows an authenticated user to to obtain...

Vendor: xibosignage
Product: xibo-cms
Published: Apr 24, 2026
Source: NVD
CVE-2026-27841 HIGH - 8.1

A vulnerability in SenseLive X3050's web management interface allows state-changing operations to be triggered without proper Cross-Site Request Forgery (CSRF) protections. Because the application does not enforce server-side validation of request origin or implement CSRF tokens, a malicious ex...

Vendor: SenseLive
Product: X3050
Published: Apr 24, 2026
Source: NVD
CVE-2026-41361 HIGH - 7.1

OpenClaw before 2026.3.28 contains an SSRF guard bypass vulnerability that fails to block four IPv6 special-use ranges. Attackers can exploit this by crafting URLs targeting internal or non-routable IPv6 addresses to bypass SSRF protections.

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 23, 2026
Source: NVD
CVE-2026-41359 HIGH - 7.1

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability allowing authenticated operators with write permissions to access admin-class Telegram configuration and cron persistence settings via the send endpoint. Attackers with operator.write credentials can exploit insufficient access ...

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 23, 2026
Source: NVD
CVE-2026-41355 HIGH - 7.3

OpenShell before 2026.3.28 contains an arbitrary code execution vulnerability in mirror mode that converts untrusted sandbox files into workspace hooks. Attackers with mirror mode access can execute arbitrary code on the host during gateway startup by exploiting enabled workspace hooks.

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 23, 2026
Source: NVD
CVE-2026-41353 HIGH - 8.1

OpenClaw before 2026.3.22 contains an access control bypass vulnerability in the allowProfiles feature that allows attackers to circumvent profile restrictions through persistent profile mutation and runtime profile selection. Remote attackers can exploit this by manipulating browser proxy profiles ...

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 23, 2026
Source: NVD
CVE-2026-41352 HIGH - 8.8

OpenClaw before 2026.3.31 contains a remote code execution vulnerability where a device-paired node can bypass the node scope gate authentication mechanism. Attackers with device pairing credentials can execute arbitrary node commands on the host system without proper node pairing validation.

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 23, 2026
Source: NVD
CVE-2026-41349 HIGH - 8.8

OpenClaw before 2026.3.28 contains an agentic consent bypass vulnerability allowing LLM agents to silently disable execution approval via config.patch parameter. Remote attackers can exploit this to bypass security controls and execute unauthorized operations without user consent.

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 23, 2026
Source: NVD
CVE-2026-41347 HIGH - 7.1

OpenClaw before 2026.3.31 lacks browser-origin validation in HTTP operator endpoints when operating in trusted-proxy mode, allowing cross-site request forgery attacks. Attackers can exploit this by sending malicious requests from a browser in trusted-proxy deployments to perform unauthorized actions...

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 23, 2026
Source: NVD
CVE-2026-41342 HIGH - 7.3

OpenClaw before 2026.3.28 contains an authentication bypass vulnerability in the remote onboarding component that persists unauthenticated discovery endpoints without explicit trust confirmation. Attackers can spoof discovery endpoints to redirect onboarding toward malicious gateways and capture gat...

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 23, 2026
Source: NVD
CVE-2026-41336 HIGH - 7.8

OpenClaw before 2026.3.31 allows workspace .env files to override the OPENCLAW_BUNDLED_HOOKS_DIR environment variable, enabling loading of attacker-controlled hook code. Attackers can replace trusted default-on bundled hooks from untrusted workspaces to execute arbitrary code.

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 23, 2026
Source: NVD
CVE-2026-32172 HIGH - 8.0

Uncontrolled search path element in Microsoft Power Apps allows an unauthorized attacker to execute code over a network.

Vendor: microsoft
Product: power_apps
Published: Apr 23, 2026
Source: NVD
CVE-2026-26150 HIGH - 8.6

Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized attacker to elevate privileges over a network.

Vendor: microsoft
Product: purview_ediscovery
Published: Apr 23, 2026
Source: NVD
CVE-2026-41900 HIGH - 8.8

OpenLearnX has Critical Remote Code Execution Through Python Sandbox Escape via Code Execution Environment

Vendor: npm
Product: openlearnx
Published: Apr 23, 2026
Source: GitHub
CVE-2026-40886 HIGH - 7.7

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. From 3.6.5 to 4.0.4, an unchecked array index in the pod informer's podGCFromPod() function causes a controller-wide panic when a workflow pod carries a malformed workflows.argoproj....

Vendor: go
Product: github.com/argoproj/argo-workflows/v4
Published: Apr 23, 2026
Source: GitHub
CVE-2026-34587 HIGH - 8.1

Kirby is an open-source content management system. Prior to versions 4.9.0 and 5.4.0, Kirby's user permissions control which user role is allowed to perform specific actions to content models in the CMS. These permissions are defined for each role in the user blueprint (`site/blueprints/users/....

Vendor: composer
Product: getkirby/cms
Published: Apr 23, 2026
Source: GitHub
CVE-2026-33318 HIGH - 8.8

Actual is a local-first personal finance tool. Prior to version 26.4.0, any authenticated user (including `BASIC` role) can escalate to `ADMIN` on servers migrated from password authentication to OpenID Connect. Three weaknesses combine: `POST /account/change-password` has no authorization check, al...

Vendor: npm
Product: @actual-app/sync-server
Published: Apr 23, 2026
Source: GitHub
CVE-2026-6940 HIGH - 7.1

radare2 prior to 6.1.4 contains a path traversal vulnerability in project deletion that allows local attackers to recursively delete arbitrary directories by supplying absolute paths that escape the configured dir.projects root directory. Attackers can craft absolute paths to project marker files ou...

Vendor: radare
Product: radare2
Published: Apr 23, 2026
Source: NVD
CVE-2026-41279 HIGH - 7.5

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the text-to-speech generation endpoint (POST /api/v1/text-to-speech/generate) is whitelisted (no auth) and accepts a credentialId directly in the request body. When called without a chatflowI...

Vendor: FlowiseAI
Product: Flowise
Published: Apr 23, 2026
Source: NVD