6.3

CVSS4.0

CVE-2026-33580 - OpenClaw < 2026.3.28 - Brute Force Attack via Missing Rate Limiting on Webhook Shared Secret Authenโ€ฆ

OpenClaw before 2026.3.28 contains a missing rate limiting vulnerability in the Nextcloud Talk webhook authentication that allows attackers to brute-force weak shared secrets. Attackers who can reach the webhook endpoint can exploit this to forge inbound webhook events by repeatedly attempting authโ€ฆ

๐Ÿ“… Published: March 31, 2026, 2:10 p.m. ๐Ÿ”„ Last Modified: April 1, 2026, 6:54 p.m.

8.6

CVSS4.0

CVE-2026-33579 - OpenClaw < 2026.3.28 - Privilege Escalation via Missing Caller Scope Validation in Device Pair Apprโ€ฆ

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /pair approve command path that fails to forward caller scopes into the core approval check. A caller with pairing privileges but without admin privileges can approve pending device requests asking for broader scopes incโ€ฆ

๐Ÿ“… Published: March 31, 2026, 2:10 p.m. ๐Ÿ”„ Last Modified: April 2, 2026, 12:58 p.m.

5.3

CVSS4.0

CVE-2026-33578 - OpenClaw < 2026.3.28 - Sender Policy Allowlist Bypass via Policy Downgrade in Google Chat and Zalouโ€ฆ

OpenClaw before 2026.3.28 contains a sender policy bypass vulnerability in the Google Chat and Zalouser extensions where route-level group allowlist policies silently downgrade to open policy. Attackers can exploit this policy resolution flaw to bypass sender restrictions and interact with bots desโ€ฆ

๐Ÿ“… Published: March 31, 2026, 2:10 p.m. ๐Ÿ”„ Last Modified: April 2, 2026, 1:08 p.m.

8.6

CVSS4.0

CVE-2026-33577 - OpenClaw < 2026.3.28 - Insufficient Scope Validation in node.pair.approve

OpenClaw before 2026.3.28 contains an insufficient scope validation vulnerability in the node pairing approval path that allows low-privilege operators to approve nodes with broader scopes. Attackers can exploit missing callerScopes validation in node-pairing.ts to extend privileges onto paired nodโ€ฆ

๐Ÿ“… Published: March 31, 2026, 2:10 p.m. ๐Ÿ”„ Last Modified: April 2, 2026, 12:57 p.m.

6.9

CVSS4.0

CVE-2026-33576 - OpenClaw < 2026.3.28 - Unauthorized Media Download via Zalo Channel

OpenClaw before 2026.3.28 downloads and stores inbound media from Zalo channels before validating sender authorization. Unauthorized senders can force network fetches and disk writes to the media store by sending messages that are subsequently rejected.

๐Ÿ“… Published: March 31, 2026, 2:10 p.m. ๐Ÿ”„ Last Modified: April 1, 2026, 7:19 p.m.

6

CVSS4.0

CVE-2026-34210 - mppx has Stripe charge credential replay via missing idempotency check

mppx is a TypeScript interface for machine payments protocol. Prior to version 0.4.11, the stripe/charge payment method did not check Stripe's Idempotent-Replayed response header when creating PaymentIntents. An attacker could replay a valid credential containing the same spt token against a new chโ€ฆ

๐Ÿ“… Published: March 31, 2026, 2:10 p.m. ๐Ÿ”„ Last Modified: March 31, 2026, 2:10 p.m.

8.4

CVSS4.0

CVE-2026-34377 - Zebra has a Consensus Failure due to Improper Verification of V5 Transactions

ZEBRA is a Zcash node written entirely in Rust. Prior to zebrad version 4.3.0 and zebra-consensus version 5.0.1, a logic error in Zebra's transaction verification cache could allow a malicious miner to induce a consensus split. By matching a valid transaction's txid while providing invalid authorizโ€ฆ

๐Ÿ“… Published: March 31, 2026, 2:05 p.m. ๐Ÿ”„ Last Modified: March 31, 2026, 2:05 p.m.

9.2

CVSS4.0

CVE-2026-34202 - Zebra node crash โ€” V5 transaction hash panic (P2P reachable)

ZEBRA is a Zcash node written entirely in Rust. Prior to zebrad version 4.3.0 and zebra-chain version 6.0.1, a vulnerability in Zebra's transaction processing logic allows a remote, unauthenticated attacker to cause a Zebra node to panic (crash). This is triggered by sending a specially crafted V5 โ€ฆ

๐Ÿ“… Published: March 31, 2026, 2:02 p.m. ๐Ÿ”„ Last Modified: March 31, 2026, 2:02 p.m.

7.7

CVSS4.0

CVE-2026-34200 - Nhost CLI MCP Server: Missing Inbound Authentication on Explicitly Bound Network Port

Nhost is an open source Firebase alternative with GraphQL. Prior to version 1.41.0, The Nhost CLI MCP server, when explicitly configured to listen on a network port, applies no inbound authentication and does not enforce strict CORS. This allows a malicious website visited on the same machine to isโ€ฆ

๐Ÿ“… Published: March 31, 2026, 1:57 p.m. ๐Ÿ”„ Last Modified: March 31, 2026, 1:57 p.m.

8.5

CVSS4.0

CVE-2026-20915 - Stored cross-site scripting in Pending Changes sidebar

Stored cross-site scripting (XSS) in Checkmk version 2.5.0 (beta) before 2.5.0b2 allows authenticated users with permission to create pending changes to inject malicious JavaScript into the Pending Changes sidebar, which will execute in the browsers of other users viewing the sidebar.

๐Ÿ“… Published: March 31, 2026, 1:51 p.m. ๐Ÿ”„ Last Modified: April 2, 2026, 12:06 p.m.
Total resulsts: 341791
Page 44 of 34,180
ยซ previous page ยป next page
Filters