9.8

CVSS3.1

CVE-2026-0558 - Unauthenticated File Upload in parisneo/lollms

A vulnerability in parisneo/lollms, up to and including version 2.2.0, allows unauthenticated users to upload and process files through the `/api/files/extract-text` endpoint. This endpoint does not enforce authentication, unlike other file-related endpoints, and lacks the `Depends(get_current_acti…

πŸ“… Published: March 29, 2026, 5:53 p.m. πŸ”„ Last Modified: April 2, 2026, 7:55 a.m.

7.5

CVSS3.1

CVE-2026-0560 - Server-Side Request Forgery (SSRF) in parisneo/lollms

A Server-Side Request Forgery (SSRF) vulnerability exists in parisneo/lollms versions prior to 2.2.0, specifically in the `/api/files/export-content` endpoint. The `_download_image_to_temp()` function in `backend/routers/files.py` fails to validate user-controlled URLs, allowing attackers to make a…

πŸ“… Published: March 29, 2026, 5:51 p.m. πŸ”„ Last Modified: April 2, 2026, 7:55 a.m.

8.3

CVSS3.1

CVE-2026-0562 - Insecure Direct Object Reference (IDOR) in parisneo/lollms

A critical security vulnerability in parisneo/lollms versions up to 2.2.0 allows any authenticated user to accept or reject friend requests belonging to other users. The `respond_request()` function in `backend/routers/friends.py` does not implement proper authorization checks, enabling Insecure Di…

πŸ“… Published: March 29, 2026, 5:49 p.m. πŸ”„ Last Modified: April 22, 2026, 4:16 p.m.

8.8

CVSS3.1

CVE-2026-34005 - Root OS Command Injection via HostName Field in Xiongmai DVR/NVR

In Sofia on Xiongmai DVR/NVR (AHB7008T-MH-V2 and NBD7024H-P) 4.03.R11 devices, root OS command injection can occur via shell metacharacters in the HostName value via an authenticated DVRIP protocol (TCP port 34567) request to the NetWork.NetCommon configuration handler, because system() is used.

πŸ“… Published: March 29, 2026, 5:02 p.m. πŸ”„ Last Modified: March 30, 2026, 2:19 p.m.

8.7

CVSS4.0

CVE-2026-5046 - Tenda FH1201 Parameter WrlExtraSet formWrlExtraSet stack-based overflow

A flaw has been found in Tenda FH1201 1.2.0.14(408). Affected is the function formWrlExtraSet of the file /goform/WrlExtraSet of the component Parameter Handler. Executing a manipulation of the argument GO can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit…

πŸ“… Published: March 29, 2026, 2:15 p.m. πŸ”„ Last Modified: March 30, 2026, 8:56 p.m.

8.7

CVSS4.0

CVE-2026-5045 - Tenda FH1201 Parameter WrlclientSet stack-based overflow

A vulnerability was detected in Tenda FH1201 1.2.0.14(408). This impacts the function WrlclientSet of the file /goform/WrlclientSet of the component Parameter Handler. Performing a manipulation of the argument GO results in stack-based buffer overflow. The attack is possible to be carried out remot…

πŸ“… Published: March 29, 2026, 1:15 p.m. πŸ”„ Last Modified: April 1, 2026, 3:35 p.m.

8.6

CVSS4.0

CVE-2026-33575 - OpenClaw < 2026.3.12 - Long-lived Credential Exposure in Pairing Setup Codes

OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials directly in pairing setup codes generated by /pair endpoint and OpenClaw qr command. Attackers with access to leaked setup codes from chat history, logs, or screenshots can recover and reuse the shared gateway credential outside…

πŸ“… Published: March 29, 2026, 12:44 p.m. πŸ”„ Last Modified: March 30, 2026, 3:51 p.m.

5.8

CVSS4.0

CVE-2026-33574 - OpenClaw < 2026.3.8 - Path Traversal via Tools Root Rebinding in Skills Download

OpenClaw before 2026.3.8 contains a path traversal vulnerability in the skills download installer that validates the tools root lexically but reuses the mutable path during archive download and copy operations. A local attacker can rebind the tools-root path between validation and final write to re…

πŸ“… Published: March 29, 2026, 12:44 p.m. πŸ”„ Last Modified: March 31, 2026, 5:12 p.m.

8.7

CVSS4.0

CVE-2026-33573 - OpenClaw < 2026.3.11 - Workspace Boundary Bypass via Agent RPC Parameters

OpenClaw before 2026.3.11 contains an authorization bypass vulnerability in the gateway agent RPC that allows authenticated operators with operator.write permission to override workspace boundaries by supplying attacker-controlled spawnedBy and workspaceDir values. Remote operators can escape the c…

πŸ“… Published: March 29, 2026, 12:44 p.m. πŸ”„ Last Modified: March 30, 2026, 3:51 p.m.

6.8

CVSS4.0

CVE-2026-33572 - OpenClaw < 2026.2.17 - Insufficient File Permissions in Session Transcript Files

OpenClaw before 2026.2.17 creates session transcript JSONL files with overly broad default permissions, allowing local users to read transcript contents. Attackers with local access can read transcript files to extract sensitive information including secrets from tool output.

πŸ“… Published: March 29, 2026, 12:44 p.m. πŸ”„ Last Modified: April 1, 2026, 3:33 p.m.
Total resulsts: 349182
Page 809 of 34,919
Β« previous page Β» next page
Filters