Total CVEs

125,681

Critical Severity

2,261

High Severity

7,827

Last 7 Days

1,162
Quick preset (or use dates below)
Clear Filters
๐Ÿ“… Showing Year: 2026 (January 1 - December 31, 2026) View All Years โ†’
Showing 1,121 - 1,140 of 22,086 CVEs
CVE-2026-41909 MEDIUM - 5.4

OpenClaw before 2026.4.20 contains an improper authorization vulnerability in paired-device pairing management that allows limited-scope sessions to enumerate and act on pairing requests. Attackers with paired-device access can approve or operate on unrelated pending device requests within the same ...

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 23, 2026
Source: NVD
CVE-2026-41908 MEDIUM - 4.3

OpenClaw before 2026.4.20 contains a scope enforcement bypass vulnerability in the assistant-media route that allows trusted-proxy callers without operator.read scope to access protected assistant-media files and metadata. Attackers can bypass identity-bearing HTTP auth path scope validation to retr...

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 23, 2026
Source: NVD
CVE-2026-40891 MEDIUM - 5.3

OpenTelemetry dotnet is a dotnet telemetry framework. From 1.13.1 to before 1.15.2, When exporting telemetry over gRPC using the OpenTelemetry Protocol (OTLP), the exporter may parse a server-provided grpc-status-details-bin trailer during retry handling. Prior to the fix, a malformed trailer could ...

Vendor: open-telemetry
Product: opentelemetry-dotnet, OpenTelemetry.Exporter.OpenTelemetryProtocol
Published: Apr 23, 2026
Source: NVD
CVE-2026-40182 MEDIUM - 5.3

OpenTelemetry dotnet is a dotnet telemetry framework. From 1.13.1 to before 1.15.2, When exporting telemetry to a back-end/collector over gRPC or HTTP using OpenTelemetry Protocol format (OTLP), if the request results in a unsuccessful request (i.e. HTTP 4xx or 5xx), the response is read into memory...

Vendor: open-telemetry
Product: opentelemetry-dotnet
Published: Apr 23, 2026
Source: NVD
CVE-2026-31533 CRITICAL - 9.8

In the Linux kernel, the following vulnerability has been resolved: net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption The -EBUSY handling in tls_do_encryption(), introduced by commit 859054147318 ("net: tls: handle backlogging of crypto requests"), has a use-after-fre...

Vendor: Linux
Product: Linux
Published: Apr 23, 2026
Source: NVD
CVE-2026-31181 CRITICAL - 9.8

An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the stunServerAddr parameter to /cgi-bin/cstecgi.cgi.

Vendor: totolink
Product: a3300r_firmware
Published: Apr 23, 2026
Source: NVD
CVE-2026-31179 MEDIUM - 6.5

An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the stun-port parameter to /cgi-bin/cstecgi.cgi.

Vendor: totolink
Product: a3300r_firmware
Published: Apr 23, 2026
Source: NVD
CVE-2026-31178 CRITICAL - 9.8

An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the stunMaxAlive parameter to /cgi-bin/cstecgi.cgi.

Vendor: totolink
Product: a3300r_firmware
Published: Apr 23, 2026
Source: NVD
CVE-2026-31177 CRITICAL - 9.8

An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the stunMinAlive parameter to /cgi-bin/cstecgi.cgi.

Vendor: totolink
Product: a3300r_firmware
Published: Apr 23, 2026
Source: NVD
CVE-2026-31176 MEDIUM - 6.5

An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the stun-user parameter to /cgi-bin/cstecgi.cgi.

Vendor: totolink
Product: a3300r_firmware
Published: Apr 23, 2026
Source: NVD
CVE-2026-31175 CRITICAL - 9.8

An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the stunEnable parameter to /cgi-bin/cstecgi.cgi.

Vendor: totolink
Product: a3300r_firmware
Published: Apr 23, 2026
Source: NVD
CVE-2026-31174 MEDIUM - 6.5

An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the informEnable parameter to /cgi-bin/cstecgi.cgi.

Vendor: totolink
Product: a3300r_firmware
Published: Apr 23, 2026
Source: NVD
CVE-2026-31172 MEDIUM - 6.5

An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the user parameter to /cgi-bin/cstecgi.cgi.

Vendor: totolink
Product: a3300r_firmware
Published: Apr 23, 2026
Source: NVD
CVE-2026-31171 MEDIUM - 6.5

An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the url parameter to /cgi-bin/cstecgi.cgi.

Vendor: totolink
Product: a3300r_firmware
Published: Apr 23, 2026
Source: NVD
CVE-2026-31165 MEDIUM - 6.5

An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the pppoeServiceName parameter to /cgi-bin/cstecgi.cgi.

Vendor: totolink
Product: a3300r_firmware
Published: Apr 23, 2026
Source: NVD
CVE-2026-31164 MEDIUM - 6.5

An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the pppoeMtu parameter to /cgi-bin/cstecgi.cgi.

Vendor: totolink
Product: a3300r_firmware
Published: Apr 23, 2026
Source: NVD
CVE-2026-31160 MEDIUM - 6.5

An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the provider parameter to /cgi-bin/cstecgi.cgi.

Vendor: totolink
Product: a3300r_firmware
Published: Apr 23, 2026
Source: NVD
CVE-2026-31159 MEDIUM - 6.5

An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the password parameter to /cgi-bin/cstecgi.cgi.

Vendor: totolink
Product: a3300r_firmware
Published: Apr 23, 2026
Source: NVD
CVE-2026-40472 CRITICAL - 9.9

In hackage-server, user-controlled metadata from .cabal files are rendered into HTML href attributes without proper sanitization, enabling stored Cross-Site Scripting (XSS) attacks.

Published: Apr 23, 2026
Source: NVD
CVE-2026-40471 CRITICAL - 9.6

hackage-server lacked Cross-Site Request Forgery (CSRF) protection across its endpoints. Scripts on foreign sites could trigger requests to hackage server, possibly abusing latent credentials to upload packages or perform other administrative actions. Some unauthenticated actions could also be abuse...

Published: Apr 23, 2026
Source: NVD