6.3

CVSS3.1

CVE-2026-35588 - Glances has CQL Injection in its Cassandra Export Module via Unsanitized Config Values

Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.4, the Cassandra export module (`glances/exports/glances_cassandra/__init__.py`) interpolates `keyspace`, `table`, and `replication_factor` configuration values directly into CQL statements without validation. A u…

📅 Published: April 20, 2026, 11:20 p.m. 🔄 Last Modified: April 22, 2026, 6:40 p.m.

7.3

CVSS4.0

CVE-2026-35587 - Glances IP Plugin has SSRF via public_api that leads to credential leakage

Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.4, a Server-Side Request Forgery (SSRF) vulnerability exists in the Glances IP plugin due to improper validation of the public_api configuration parameter. The value of public_api is used directly in outbound HTTP…

📅 Published: April 20, 2026, 11:19 p.m. 🔄 Last Modified: April 23, 2026, 6:42 p.m.

7.7

CVSS4.0

CVE-2026-34839 - Glances Vulnerable to Cross-Origin Information Disclosure via Unauthenticated REST API (/api/4) due…

Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.4, the Glances web server exposes a REST API (`/api/4/*`) that is accessible without authentication and allows cross-origin requests from any origin due to a permissive CORS policy (`Access-Control-Allow-Origin: *…

📅 Published: April 20, 2026, 11:09 p.m. 🔄 Last Modified: April 24, 2026, 7:09 p.m.

6.9

CVSS4.0

CVE-2026-41331 - OpenClaw < 2026.3.31 - Resource Consumption via Unauthorized Telegram Audio Preflight Transcription

OpenClaw before 2026.3.31 contains a resource consumption vulnerability in Telegram audio preflight transcription that allows unauthorized group senders to trigger transcription processing. Attackers can exploit insufficient allowlist enforcement to cause resource or billing consumption by initiati…

📅 Published: April 20, 2026, 11:08 p.m. 🔄 Last Modified: April 21, 2026, 3:37 p.m.

2

CVSS4.0

CVE-2026-41330 - OpenClaw < 2026.3.31 - Environment Variable Override via Host Exec Policy

OpenClaw before 2026.3.31 contains an environment variable override vulnerability in host exec policy that fails to properly enforce proxy, TLS, Docker, and Git TLS controls. Attackers can bypass security controls by overriding environment variables to circumvent proxy settings, TLS verification, D…

📅 Published: April 20, 2026, 11:08 p.m. 🔄 Last Modified: April 21, 2026, 3:45 p.m.

9

CVSS4.0

CVE-2026-41329 - OpenClaw < 2026.3.31 - Sandbox Bypass via Heartbeat Context Inheritance and senderIsOwner Escalation

OpenClaw before 2026.3.31 contains a sandbox bypass vulnerability allowing attackers to escalate privileges via heartbeat context inheritance and senderIsOwner parameter manipulation. Attackers can exploit improper context validation to bypass sandbox restrictions and achieve unauthorized privilege…

📅 Published: April 20, 2026, 11:08 p.m. 🔄 Last Modified: April 22, 2026, 6 a.m.

8.7

CVSS4.0

CVE-2026-41303 - OpenClaw < 2026.3.28 - Authorization Bypass in Discord Text Approval Commands

OpenClaw before 2026.3.28 contains an authorization bypass vulnerability in Discord text approval commands that allows non-approvers to resolve pending exec approvals. Attackers can send Discord text commands to bypass the channels.discord.execApprovals.approvers allowlist and approve pending host …

📅 Published: April 20, 2026, 11:08 p.m. 🔄 Last Modified: April 21, 2026, 3:45 p.m.

4.8

CVSS4.0

CVE-2026-41302 - OpenClaw < 2026.3.31 - Server-Side Request Forgery via Unguarded fetch() in Marketplace Plugin Down…

OpenClaw before 2026.3.31 contains a server-side request forgery vulnerability in the marketplace plugin download functionality that allows remote attackers to make arbitrary network requests. Attackers can exploit unguarded fetch() calls to access internal resources or interact with external servi…

📅 Published: April 20, 2026, 11:08 p.m. 🔄 Last Modified: April 20, 2026, 11:08 p.m.

6.9

CVSS4.0

CVE-2026-41301 - OpenClaw 2026.3.22 < 2026.3.31 - Forged Nostr DM Pairing State Creation via Signature Verification …

OpenClaw versions 2026.3.22 before 2026.3.31 contain a signature verification bypass vulnerability in the Nostr DM ingress path that allows pairing challenges to be issued before event signature validation. An unauthenticated remote attacker can send forged direct messages to create pending pairing…

📅 Published: April 20, 2026, 11:08 p.m. 🔄 Last Modified: April 21, 2026, 3:45 p.m.

6.9

CVSS4.0

CVE-2026-41300 - OpenClaw < 2026.3.31 - Attacker-Discovered Endpoint Preservation in Remote Onboarding

OpenClaw before 2026.3.31 contains a trust-decline vulnerability that preserves attacker-discovered endpoints in remote onboarding flows. Attackers can route gateway credentials to malicious endpoints by having their discovered URL survive the trust decline process into manual prompts requiring ope…

📅 Published: April 20, 2026, 11:08 p.m. 🔄 Last Modified: April 21, 2026, 3:45 p.m.
Total resulsts: 346514
Page 115 of 34,652
« previous page » next page
Filters