5.3

CVSS4.0

CVE-2026-34425 - OpenClaw - Shell-Bleed Protection Preflight Validation Bypass

OpenClaw versions prior to commit 8aceaf5 contain a preflight validation bypass vulnerability in shell-bleed protection that allows attackers to execute blocked script content by using piped or complex command forms that the parser fails to recognize. Attackers can craft commands such as piped exec…

πŸ“… Published: April 2, 2026, 6:15 p.m. πŸ”„ Last Modified: April 2, 2026, 7:21 p.m.

8.8

CVSS3.1

CVE-2025-43264 -

The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted image may corrupt process memory.

πŸ“… Published: April 2, 2026, 6:14 p.m. πŸ”„ Last Modified: April 2, 2026, 8:16 p.m.

7.5

CVSS3.1

CVE-2024-44286 -

This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15.1. An attacker with physical access can input keyboard events to apps running on a locked device.

πŸ“… Published: April 2, 2026, 6:13 p.m. πŸ”„ Last Modified: April 2, 2026, 8:16 p.m.

7.5

CVSS3.1

CVE-2024-44219 -

A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.1. A malicious application with root privileges may be able to access private information.

πŸ“… Published: April 2, 2026, 6:11 p.m. πŸ”„ Last Modified: April 2, 2026, 8:16 p.m.

0.0

CVE-2025-43202 -

This issue was addressed with improved memory handling. This issue is fixed in iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6. Processing a file may lead to memory corruption.

πŸ“… Published: April 2, 2026, 6:10 p.m. πŸ”„ Last Modified: April 2, 2026, 7:20 p.m.

6.2

CVSS3.1

CVE-2025-43238 -

An integer overflow was addressed with improved input validation. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to cause unexpected system termination.

πŸ“… Published: April 2, 2026, 6:09 p.m. πŸ”„ Last Modified: April 2, 2026, 8:16 p.m.

5.5

CVSS3.1

CVE-2026-34730 - Copier `_external_data` allows path traversal and absolute-path local file read without unsafe mode

Copier is a library and CLI app for rendering project templates. Prior to version 9.14.1, Copier's _external_data feature allows a template to load YAML files using template-controlled paths. If untrusted templates are in scope, a malicious template can read attacker-chosen YAML-parseable local fil…

πŸ“… Published: April 2, 2026, 6:09 p.m. πŸ”„ Last Modified: April 2, 2026, 7:21 p.m.

4.4

CVSS3.1

CVE-2026-34726 - Copier `_subdirectory` allows template root escape via parent-directory traversal

Copier is a library and CLI app for rendering project templates. Prior to version 9.14.1, Copier's _subdirectory setting is documented as the subdirectory to use as the template root. However, the current implementation accepts parent-directory traversal such as .. and uses it directly when selecti…

πŸ“… Published: April 2, 2026, 6:07 p.m. πŸ”„ Last Modified: April 2, 2026, 7:21 p.m.

8.8

CVSS3.1

CVE-2025-43219 -

The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted image may corrupt process memory.

πŸ“… Published: April 2, 2026, 6:07 p.m. πŸ”„ Last Modified: April 2, 2026, 8:16 p.m.

8.1

CVSS3.1

CVE-2026-34581 - goshs has Auth Bypass via Share Token

goshs is a SimpleHTTPServer written in Go. From version 1.1.0 to before version 2.0.0-beta.2, when using the Share Token it is possible to bypass the limited selected file download with all the gosh functionalities, including code exec. This issue has been patched in version 2.0.0-beta.2.

πŸ“… Published: April 2, 2026, 6:04 p.m. πŸ”„ Last Modified: April 2, 2026, 7:21 p.m.
Total resulsts: 341940
Page 5 of 34,194
Β« previous page Β» next page
Filters