Total CVEs

125,843

Critical Severity

2,274

High Severity

7,870

Last 7 Days

1,169
Quick preset (or use dates below)
Clear Filters
๐Ÿ“… Showing Year: 2026 (January 1 - December 31, 2026) View All Years โ†’
Showing 141 - 160 of 7,570 CVEs
CVE-2026-33489 HIGH - 7.5

CoreDNS' transfer stanza selection uses lexicographic compare (subzone ACL bypass)

Vendor: go
Product: github.com/coredns/coredns
Published: Apr 28, 2026
Source: GitHub
CVE-2026-32936 HIGH - 7.5

CoreDNS DoH GET oversized dns= query parameter causes pre-validation CPU and memory amplification

Vendor: go
Product: github.com/coredns/coredns
Published: Apr 28, 2026
Source: GitHub
CVE-2026-32934 HIGH - 7.5

CoreDNS' DoQ worker pool does not bound stream backlog

Vendor: go
Product: github.com/coredns/coredns
Published: Apr 28, 2026
Source: GitHub
CVE-2026-7319 HIGH - 7.3

A flaw has been found in elinsky execution-system-mcp 0.1.0. The impacted element is the function _get_context_file_path of the file src/execution_system_mcp/server.py of the component add_action Tool. This manipulation of the argument context causes path traversal. The attack can be initiated remot...

Published: Apr 28, 2026
Source: NVD
CVE-2026-7316 HIGH - 7.3

A vulnerability has been found in eiliyaabedini aider-mcp up to 667b914301aada695aab0e46d1fb3a7d5e32c8af. Affected is an unknown function of the file aider_mcp.py of the component code_with_ai. The manipulation of the argument working_dir/editable_files leads to command injection. The attack may be ...

Published: Apr 28, 2026
Source: NVD
CVE-2026-7315 HIGH - 7.3

A flaw has been found in eiceblue spire-pdf-mcp-server 0.1.1. This impacts the function get_pdf_path of the file src/spire_pdf_mcp/server.py of the component PDF File Handler. Executing a manipulation of the argument filepath can lead to path traversal. The attack can be launched remotely. The explo...

Published: Apr 28, 2026
Source: NVD
CVE-2026-7314 HIGH - 7.3

A vulnerability was detected in eiceblue spire-doc-mcp-server 1.0.0. This affects the function get_doc_path of the file src/spire_doc_mcp/api/base.py. Performing a manipulation of the argument document_name results in path traversal. The attack can be initiated remotely. The exploit is now public an...

Published: Apr 28, 2026
Source: NVD
CVE-2026-41649 HIGH - 7.7

Outline is a service that allows for collaborative documentation. The `shares.create` API endpoint starting in version 0.86.0 and prior to version 1.7.0 has an insecure direct object reference.. When both `collectionId` and `documentId` are provided in the request, the authorization logic only check...

Vendor: outline
Product: outline
Published: Apr 28, 2026
Source: NVD
CVE-2026-42432 HIGH - 7.8

OpenClaw before 2026.4.8 contains a privilege escalation vulnerability allowing previously paired nodes to reconnect with exec-capable commands without operator.admin scope requirement. Attackers can bypass re-pairing authentication to execute privileged commands on the local assistant system.

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD
CVE-2026-42431 HIGH - 8.1

OpenClaw before 2026.4.8 contains a security bypass vulnerability in node.invoke(browser.proxy) that allows mutation of persistent browser profiles. Attackers can exploit this path to circumvent the browser.request persistent profile-mutation guard and modify browser configurations.

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD
CVE-2026-42429 HIGH - 7.1

OpenClaw before 2026.4.8 contains a privilege escalation vulnerability in the gateway plugin HTTP authentication mechanism that widens identity-bearing operator.read requests into runtime operator.write permissions. Attackers can exploit this by sending read-scoped requests through the gateway auth ...

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD
CVE-2026-42428 HIGH - 7.1

OpenClaw versions before 2026.4.8 fail to enforce integrity verification on downloaded plugin archives. Attackers can install malicious or tampered plugin packages without detection, compromising the local assistant environment.

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD
CVE-2026-42426 HIGH - 8.8

OpenClaw before 2026.4.8 contains an improper authorization vulnerability where the node.pair.approve method accepts operator.write scope instead of the narrower operator.pairing scope, allowing unprivileged users to approve node pairing. Attackers with operator.write permissions can bypass pairing ...

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD
CVE-2026-42423 HIGH - 7.5

OpenClaw before 2026.4.8 contains an approval-timeout fallback mechanism that bypasses strictInlineEval explicit-approval requirements on gateway and node exec hosts. Attackers can exploit this timeout fallback to execute inline eval commands that should require explicit user approval, circumventing...

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD
CVE-2026-42422 HIGH - 8.8

OpenClaw before 2026.4.8 contains a role bypass vulnerability in the device.token.rotate function that allows minting tokens for unapproved roles. Attackers can bypass device role-upgrade pairing to preserve or mint roles and scopes that had not undergone intended approval.

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD
CVE-2026-41914 HIGH - 8.5

OpenClaw before 2026.4.8 contains a server-side request forgery vulnerability in QQ Bot media download paths that bypass SSRF protection. Attackers can exploit unprotected media fetch endpoints to access internal resources and bypass allowlist policies.

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD
CVE-2026-41912 HIGH - 7.6

OpenClaw before 2026.4.8 contains a server-side request forgery policy bypass vulnerability allowing attackers to trigger navigations bypassing normal SSRF checks. Attackers can exploit browser interactions to bypass SSRF protections and access restricted resources.

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD
CVE-2026-41405 HIGH - 7.5

OpenClaw before 2026.3.31 parses MS Teams webhook request bodies before performing JWT validation, allowing unauthenticated attackers to trigger resource exhaustion. Remote attackers can send malicious Teams webhook payloads to exhaust server resources by bypassing authentication checks.

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD
CVE-2026-41404 HIGH - 8.8

OpenClaw before 2026.3.31 contains an incomplete scope-clearing vulnerability in trusted-proxy authentication mode that allows operator.admin privilege escalation. Attackers can exploit this by declaring operator scopes on non-Control-UI clients, allowing self-declared scopes to persist on identity-...

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD
CVE-2026-41399 HIGH - 7.5

OpenClaw before 2026.3.28 accepts unbounded concurrent unauthenticated WebSocket upgrades without pre-authentication budget allocation. Unauthenticated network attackers can exhaust socket and worker capacity to disrupt WebSocket availability for legitimate clients.

Vendor: OpenClaw
Product: OpenClaw
Published: Apr 28, 2026
Source: NVD