8.1

CVSS3.1

CVE-2026-29096 - SuiteCRM vulnerable to Authenticated SQL Injection via unsanitized field_function in Report Fields

SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 7.15.1 and 8.9.3, when creating or editing a report (AOR_Reports module), the `field_function` parameter from POST data is saved directly into the `aor_fields` table without a…

📅 Published: March 19, 2026, 10:37 p.m. 🔄 Last Modified: March 19, 2026, 10:37 p.m.

8.2

CVSS3.1

CVE-2026-22731 - Authentication Bypass under Actuator Health groups paths

Spring Boot applications with Actuator can be vulnerable to an "Authentication Bypass" vulnerability when an application endpoint that requires authentication is declared under a specific path, already configured for a Health Group additional path. This issue affects Spring Boot: from 4.0 before 4.…

📅 Published: March 19, 2026, 10:36 p.m. 🔄 Last Modified: March 20, 2026, 3:33 p.m.

1.8

CVSS4.0

CVE-2026-30874 - OpenWrt procd PATH Environment Variable Filter Bypass via Incorrect String Comparison Leads to Priv…

OpenWrt Project is a Linux operating system targeting embedded devices. In versions prior to 24.10.6, a vulnerability in the hotplug_call function allows an attacker to bypass environment variable filtering and inject an arbitrary PATH variable, potentially leading to privilege escalation. The func…

📅 Published: March 19, 2026, 10:36 p.m. 🔄 Last Modified: March 20, 2026, 5:13 p.m.

2.2

CVSS3.1

CVE-2026-33408 - Discourse has Improper Authorization in "Post Edits" Report For Moderators

Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, moderators were able to see the first 40 characters of post edits in PMs and private categories. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are…

📅 Published: March 19, 2026, 10:35 p.m. 🔄 Last Modified: March 20, 2026, 8:08 p.m.

4.4

CVSS3.1

CVE-2026-33395 - Discourse has stored click‑based XSS via Graphviz SVG javascript: links

Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, the discourse-graphviz plugin contains a stored cross-site scripting (XSS) vulnerability that allows authenticated users to inject malicious JavaScript code through DOT graph definitions. F…

📅 Published: March 19, 2026, 10:33 p.m. 🔄 Last Modified: March 20, 2026, 4:40 p.m.

7.5

CVSS4.0

CVE-2026-32041 - OpenClaw < 2026.3.1 - Unauthenticated Browser Control Access via Failed Auth Bootstrap

OpenClaw versions prior to 2026.3.1 fail to properly handle authentication bootstrap errors during startup, allowing browser-control routes to remain accessible without authentication. Local processes or loopback-reachable SSRF paths can exploit this to access browser-control routes including evalu…

📅 Published: March 19, 2026, 10:07 p.m. 🔄 Last Modified: March 20, 2026, 5:52 p.m.

2.4

CVSS4.0

CVE-2026-32040 - OpenClaw < 2026.2.23 - HTML Injection via Unvalidated Image MIME Type in Data-URL Interpolation

OpenClaw versions prior to 2026.2.23 contain an html injection vulnerability in the HTML session exporter that allows attackers to execute arbitrary javascript by injecting malicious mimeType values in image content blocks. Attackers can craft session entries with specially crafted mimeType attribu…

📅 Published: March 19, 2026, 10:07 p.m. 🔄 Last Modified: March 21, 2026, 3:12 a.m.

6

CVSS4.0

CVE-2026-32039 - OpenClaw < 2026.2.22 - Sender Authorization Bypass via Identity Collision in toolsBySender

OpenClaw versions prior to 2026.2.22 contain an authorization bypass vulnerability in the toolsBySender group policy matching that allows attackers to inherit elevated tool permissions through identifier collision attacks. Attackers can exploit untyped sender keys by forcing collisions with mutable…

📅 Published: March 19, 2026, 10:07 p.m. 🔄 Last Modified: March 20, 2026, 3:50 p.m.

9.3

CVSS4.0

CVE-2026-32038 - OpenClaw - Sandbox Network Isolation Bypass via docker.network=container Parameter

OpenClaw before 2026.2.24 contains a sandbox network isolation bypass vulnerability that allows trusted operators to join another container's network namespace. Attackers can configure the docker.network parameter with container:<id> values to reach services in target container namespaces and bypas…

📅 Published: March 19, 2026, 10:07 p.m. 🔄 Last Modified: March 20, 2026, 8:09 p.m.

2.3

CVSS4.0

CVE-2026-32037 - OpenClaw < 2026.2.22 - Redirect Chain Bypass of Media Host Allowlist in MSTeams Attachment Handling

OpenClaw versions prior to 2026.2.22 fail to consistently validate redirect chains against configured mediaAllowHosts allowlists during MSTeams media downloads. Attackers can supply or influence attachment URLs to force redirects to non-allowlisted targets, bypassing SSRF boundary controls.

📅 Published: March 19, 2026, 10:07 p.m. 🔄 Last Modified: March 20, 2026, 6:02 p.m.
Total resulsts: 339266
Page 48 of 33,927
« previous page » next page
Filters