9.3

CVSS4.0

CVE-2026-35503 - SenseLive X3050 Use of Hard-coded Credentials

A vulnerability inย SenseLive X3050โ€™s web management interface allows authentication logic to be performed entirely on the client side, relying on hardcoded values within browser-executed scripts rather than server-side verification. An attacker with access to the login page could retrieve these expโ€ฆ

๐Ÿ“… Published: April 23, 2026, 11:50 p.m. ๐Ÿ”„ Last Modified: April 23, 2026, 11:50 p.m.

6.9

CVSS4.0

CVE-2026-25720 - SenseLive X3050 Insufficient session expiration

A vulnerability exists inย SenseLive X3050โ€™s web management interface due to improper session lifetime enforcement, allowing authenticated sessions to remain active for extended periods without requiring re-authentication. An attacker with access to a previously authenticated session could continueโ€ฆ

๐Ÿ“… Published: April 23, 2026, 11:48 p.m. ๐Ÿ”„ Last Modified: April 23, 2026, 11:48 p.m.

9.3

CVSS4.0

CVE-2026-40630 - SenseLive X3050 Authentication bypass using an alternate path or channel

A vulnerability inย  SenseLive X3050โ€™s web management interface allows unauthorized access to certain configuration endpoints due to improper access control enforcement. An attacker with network access to the device may be able to bypass the intended authentication mechanism and directly interact โ€ฆ

๐Ÿ“… Published: April 23, 2026, 11:45 p.m. ๐Ÿ”„ Last Modified: April 23, 2026, 11:45 p.m.

6.9

CVSS4.0

CVE-2026-1789 -

A vulnerability in the browser-based remote management interface may allow an administrator to access sensitive information on the device via crafted requests, affecting certain production printers and office/small office multifunction printers.

๐Ÿ“… Published: April 23, 2026, 11:38 p.m. ๐Ÿ”„ Last Modified: April 24, 2026, 6:18 p.m.

4.3

CVSS3.1

CVE-2026-29197 -

In versions <8.4.0, <8.3.2, <8.2.2, <8.1.3, <8.0.4, <7.13.6, <7.12.7, <7.11.7, and <7.10.10, the endpoints /api/apps/logs and /api/apps/:id/logs have a typo in the required permission check, allowing authenticated users without the proper permissions to read apps-engine logs.

๐Ÿ“… Published: April 23, 2026, 11:19 p.m. ๐Ÿ”„ Last Modified: April 24, 2026, 3:16 p.m.

6.5

CVSS3.1

CVE-2026-6732 - Libxml2: libxml2: denial of service via crafted xsd-validated document

A flaw was found in libxml2. This vulnerability occurs when the library processes a specially crafted XML Schema Definition (XSD) validated document that includes an internal entity reference. An attacker could exploit this by providing a malicious document, leading to a type confusion error that cโ€ฆ

๐Ÿ“… Published: April 23, 2026, 10:19 p.m. ๐Ÿ”„ Last Modified: April 23, 2026, 10:19 p.m.

5.1

CVSS4.0

CVE-2026-41361 - OpenClaw < 2026.3.28 - SSRF Guard Bypass via IPv6 Special-Use Ranges

OpenClaw before 2026.3.28 contains an SSRF guard bypass vulnerability that fails to block four IPv6 special-use ranges. Attackers can exploit this by crafting URLs targeting internal or non-routable IPv6 addresses to bypass SSRF protections.

๐Ÿ“… Published: April 23, 2026, 9:58 p.m. ๐Ÿ”„ Last Modified: April 23, 2026, 9:58 p.m.

5.4

CVSS4.0

CVE-2026-41360 - OpenClaw < 2026.4.2 - Approval Integrity Bypass in pnpm dlx Local Script Binding

OpenClaw before 2026.4.2 contains an approval integrity vulnerability in pnpm dlx that fails to bind local script operands consistently with pnpm exec flows. Attackers can replace approved local scripts before execution without invalidating the approval plan, allowing execution of modified script cโ€ฆ

๐Ÿ“… Published: April 23, 2026, 9:58 p.m. ๐Ÿ”„ Last Modified: April 23, 2026, 9:58 p.m.

7.1

CVSS4.0

CVE-2026-41359 - OpenClaw < 2026.3.28 - Privilege Escalation via operator.write to Admin-Class Telegram Config and Cโ€ฆ

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability allowing authenticated operators with write permissions to access admin-class Telegram configuration and cron persistence settings via the send endpoint. Attackers with operator.write credentials can exploit insufficient accessโ€ฆ

๐Ÿ“… Published: April 23, 2026, 9:58 p.m. ๐Ÿ”„ Last Modified: April 25, 2026, 1:37 a.m.

2.3

CVSS4.0

CVE-2026-41358 - OpenClaw < 2026.4.2 - Sender Allowlist Bypass via Slack Thread Context

OpenClaw before 2026.4.2 fails to filter Slack thread context by sender allowlist, allowing non-allowlisted messages to enter agent context. Attackers can inject unauthorized thread messages through allowlisted user replies to bypass sender access controls and manipulate model context.

๐Ÿ“… Published: April 23, 2026, 9:58 p.m. ๐Ÿ”„ Last Modified: April 24, 2026, 4:34 p.m.
Total resulsts: 346533
Page 31 of 34,654
ยซ previous page ยป next page
Filters