5.3

CVSS3.1

CVE-2026-40894 - OpenTelemetry dotnet: Excessive memory allocation when parsing OpenTelemetry propagation headers

OpenTelemetry dotnet is a dotnet telemetry framework. In OpenTelemetry.Api 0.5.0-beta.2 to 1.15.2 and OpenTelemetry.Extensions.Propagators 1.3.1 to 1.15.2, The implementation details of the baggage, B3 and Jaeger processing code in the OpenTelemetry.Api and OpenTelemetry.Extensions.Propagators NuGe…

πŸ“… Published: April 23, 2026, 6:03 p.m. πŸ”„ Last Modified: April 23, 2026, 7:22 p.m.

5.3

CVSS3.1

CVE-2026-40891 - OpenTelemetry dotnet: Unbounded `grpc-status-details-bin` parsing in OTLP/gRPC retry handling

OpenTelemetry dotnet is a dotnet telemetry framework. From 1.13.1 to before 1.15.2, When exporting telemetry over gRPC using the OpenTelemetry Protocol (OTLP), the exporter may parse a server-provided grpc-status-details-bin trailer during retry handling. Prior to the fix, a malformed trailer could…

πŸ“… Published: April 23, 2026, 5:54 p.m. πŸ”„ Last Modified: April 23, 2026, 6:23 p.m.

5.3

CVSS4.0

CVE-2026-41909 - OpenClaw < 2026.4.20 - Improper Authorization in Paired-Device Pairing Actions

OpenClaw before 2026.4.20 contains an improper authorization vulnerability in paired-device pairing management that allows limited-scope sessions to enumerate and act on pairing requests. Attackers with paired-device access can approve or operate on unrelated pending device requests within the same…

πŸ“… Published: April 23, 2026, 5:52 p.m. πŸ”„ Last Modified: April 23, 2026, 6:19 p.m.

2.3

CVSS4.0

CVE-2026-41908 - OpenClaw < 2026.4.20 - Scope Enforcement Bypass in Assistant-Media Route

OpenClaw before 2026.4.20 contains a scope enforcement bypass vulnerability in the assistant-media route that allows trusted-proxy callers without operator.read scope to access protected assistant-media files and metadata. Attackers can bypass identity-bearing HTTP auth path scope validation to ret…

πŸ“… Published: April 23, 2026, 5:52 p.m. πŸ”„ Last Modified: April 23, 2026, 6:25 p.m.

5.3

CVSS3.1

CVE-2026-40182 - OpenTelemetry dotnet: OTLP exporter reads unbounded HTTP response bodies

OpenTelemetry dotnet is a dotnet telemetry framework. From 1.13.1 to before 1.15.2, When exporting telemetry to a back-end/collector over gRPC or HTTP using OpenTelemetry Protocol format (OTLP), if the request results in a unsuccessful request (i.e. HTTP 4xx or 5xx), the response is read into memor…

πŸ“… Published: April 23, 2026, 5:51 p.m. πŸ”„ Last Modified: April 23, 2026, 6:38 p.m.

8.3

CVSS3.1

CVE-2026-6921 -

Race in GPU in Google Chrome on Windows prior to 147.0.7727.117 allowed a remote attacker to potentially perform a sandbox escape via a crafted video file. (Chromium security severity: Medium)

πŸ“… Published: April 23, 2026, 4:12 p.m. πŸ”„ Last Modified: April 24, 2026, 4:39 p.m.

9.6

CVSS3.1

CVE-2026-6920 -

Out of bounds read in GPU in Google Chrome on Android prior to 147.0.7727.117 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

πŸ“… Published: April 23, 2026, 4:12 p.m. πŸ”„ Last Modified: April 24, 2026, 4:39 p.m.

9.6

CVSS3.1

CVE-2026-6919 -

Use after free in DevTools in Google Chrome prior to 147.0.7727.117 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

πŸ“… Published: April 23, 2026, 4:12 p.m. πŸ”„ Last Modified: April 24, 2026, 4:39 p.m.

6.1

CVSS4.0

CVE-2026-5039 - Predictable Default Cryptographic Key Used for DES Encryption in TP-Link TL-WL841N

TP-Link TL-WR841N v13 uses DES-CBC encryption in the TDDPv2 debug protocol with a cryptographic key derived from default web management credentials, making the key predictable if device is left in default configuration. A network-adjacent attacker can exploit this weakness to gain unauthorized acce…

πŸ“… Published: April 23, 2026, 4:10 p.m. πŸ”„ Last Modified: April 23, 2026, 6:16 p.m.

9.9

CVSS3.1

CVE-2026-40472 - Hackage package metadata stored XSS vulnerability

In hackage-server, user-controlled metadata from .cabal files are rendered into HTML href attributes without proper sanitization, enabling stored Cross-Site Scripting (XSS) attacks.

πŸ“… Published: April 23, 2026, 3 p.m. πŸ”„ Last Modified: April 23, 2026, 4:22 p.m.
Total resulsts: 346807
Page 66 of 34,681
Β« previous page Β» next page
Filters