A vulnerability labeled as problematic has been found in OpenClaw up to 2026.2.11. The impacted element is an unknown function of the component Relay HTTP Endpoint. Such manipulation leads to binding to an unrestricted ip address.
This vulnerability is listed as CVE-2026-28395. The attack may be performed from remote. There is no available exploit.
The affected component should be upgraded.
A vulnerability, which was classified as critical, was found in OpenClaw up to 2026.2.1. This affects an unknown part of the file cmd.exe. Such manipulation leads to incomplete blacklist.
This vulnerability is traded as CVE-2026-28391. The attack may be launched remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability marked as critical has been reported in OpenClaw up to 2026.2.14. Affected by this vulnerability is an unknown functionality of the component web_fetch. The manipulation leads to allocation of resources.
This vulnerability is listed as CVE-2026-28394. The attack may be initiated remotely. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability classified as problematic was found in OpenClaw up to 2026.2.13. The affected element is an unknown function of the component Direct Message Handler. Executing a manipulation can lead to incorrect authorization.
This vulnerability is registered as CVE-2026-28392. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is advised.
A vulnerability described as critical has been identified in OpenClaw up to 2026.2.11. This affects an unknown function of the file /api/channels/nostr/ of the component Nostr Plugin. The manipulation results in missing authentication.
This vulnerability was named CVE-2026-28450. The attack needs to be approached locally. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability was found in OpenClaw up to 2026.2.13. It has been classified as problematic. This issue affects the function extractArchive of the file src/infra/archive.ts. This manipulation causes allocation of resources.
This vulnerability is registered as CVE-2026-28452. The attack needs to be launched locally. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability categorized as critical has been discovered in OpenClaw up to 2026.2.13. The impacted element is an unknown function of the component Configuration Handler. Executing a manipulation can lead to path traversal.
This vulnerability appears as CVE-2026-28453. The attack requires local access. There is no available exploit.
It is advisable to upgrade the affected component.
Researchers at AllSecure have revealed how North Korean hackers from the Lazarus Group used a fake LinkedIn job interview and deepfake technology to target their CEO.
A vulnerability, which was classified as critical, has been found in hexpm hex.pm. Affected by this issue is some unknown functionality in the library lib/hexpm/accounts/password_reset.ex of the component Reset Your Password Page. This manipulation causes session expiration.
This vulnerability appears as CVE-2026-21622. The attack may be initiated remotely. There is no available exploit.
It is suggested to install a patch to address this issue.
A vulnerability was found in filebrowser up to 2.60.x. It has been rated as problematic. The impacted element is an unknown function of the file http/public.go of the component withHashFile Middleware. This manipulation causes information disclosure.
The identification of this vulnerability is CVE-2026-28492. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability categorized as critical has been discovered in IceWhaleTech ZimaOS 1.5.2-beta3. This affects an unknown function of the component Application Interface. Such manipulation of the argument path leads to file inclusion.
This vulnerability is referenced as CVE-2026-28442. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in Frappe up to 14.99.x/15.97.x. It has been classified as critical. This affects an unknown function. This manipulation causes improper access controls.
This vulnerability is handled as CVE-2026-29077. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Frappe up to 14.100.0/15.99.x. It has been declared as critical. This impacts an unknown function. Such manipulation leads to sql injection.
This vulnerability is uniquely identified as CVE-2026-29081. The attack can be launched remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability categorized as critical has been discovered in graphprotocol contracts up to 2.x. Affected by this vulnerability is an unknown functionality. Executing a manipulation can lead to improper access controls.
The identification of this vulnerability is CVE-2026-28410. The attack may be launched remotely. There is no exploit available.
It is advisable to upgrade the affected component.