CVE tracker
303 subscribers
4.3K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2026-8010 - Google Chrome SiteIsolation Input Validation Bypass

CVE ID :CVE-2026-8010
Published : May 6, 2026, 7:16 p.m. | 49 minutes ago
Description :Insufficient validation of untrusted input in SiteIsolation in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. (Chromium security severity: Low)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-8011 - Google Chrome Cross-Origin Data Leakage

CVE ID :CVE-2026-8011
Published : May 6, 2026, 7:16 p.m. | 49 minutes ago
Description :Insufficient policy enforcement in Search in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-8012 - Google Chrome MHTML UXSS Vulnerability

CVE ID :CVE-2026-8012
Published : May 6, 2026, 7:16 p.m. | 49 minutes ago
Description :Inappropriate implementation in MHTML in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page. (Chromium security severity: Low)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-8013 - Google Chrome FedCM Input Validation Cross-Origin Data Leakage

CVE ID :CVE-2026-8013
Published : May 6, 2026, 7:16 p.m. | 49 minutes ago
Description :Insufficient validation of untrusted input in FedCM in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-8014 - Google Chrome Preload Cross-Origin Data Leak Vulnerability

CVE ID :CVE-2026-8014
Published : May 6, 2026, 7:16 p.m. | 49 minutes ago
Description :Inappropriate implementation in Preload in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-8015 - Google Chrome UI Spoofing Vulnerability

CVE ID :CVE-2026-8015
Published : May 6, 2026, 7:16 p.m. | 49 minutes ago
Description :Inappropriate implementation in Media in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-8016 - Google Chrome WebRTC Use-After-Free Remote Code Execution

CVE ID :CVE-2026-8016
Published : May 6, 2026, 7:16 p.m. | 49 minutes ago
Description :Use after free in WebRTC in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Low)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-8017 - Google Chrome Media Cross-Origin Information Leakage

CVE ID :CVE-2026-8017
Published : May 6, 2026, 7:16 p.m. | 49 minutes ago
Description :Side-channel information leakage in Media in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-8018 - Google Chrome DevTools Sandbox Escape Vulnerability

CVE ID :CVE-2026-8018
Published : May 6, 2026, 7:16 p.m. | 49 minutes ago
Description :Insufficient policy enforcement in DevTools in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to potentially perform a sandbox escape via malicious network traffic. (Chromium security severity: Low)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-8019 - Google Chrome UI Spoofing Vulnerability

CVE ID :CVE-2026-8019
Published : May 6, 2026, 7:16 p.m. | 49 minutes ago
Description :Insufficient policy enforcement in WebApp in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-8020 - Google Chrome Android GPU Uninitialized Use Information Leak

CVE ID :CVE-2026-8020
Published : May 6, 2026, 7:16 p.m. | 49 minutes ago
Description :Uninitialized Use in GPU in Google Chrome on Android prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Low)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-8021 - Google Chrome UI Script Injection Vulnerability

CVE ID :CVE-2026-8021
Published : May 6, 2026, 7:16 p.m. | 49 minutes ago
Description :Script injection in UI in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who convinced a user to engage in specific UI gestures to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page. (Chromium security severity: Low)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-8022 - Google Chrome MHTML Cross-Origin Data Disclosure

CVE ID :CVE-2026-8022
Published : May 6, 2026, 7:16 p.m. | 49 minutes ago
Description :Inappropriate implementation in MHTML in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who convinced a user to engage in specific UI gestures to leak cross-origin data via a crafted MHTML page. (Chromium security severity: Low)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-8031 - PicoTronica e-Clinic Healthcare System ECHS API Endpoint patient-records missing authentication

CVE ID :CVE-2026-8031
Published : May 6, 2026, 7:16 p.m. | 49 minutes ago
Description :A vulnerability was detected in PicoTronica e-Clinic Healthcare System ECHS 5.7. The affected element is an unknown function of the file /cdemos/echs/api/v2/patient-records of the component API Endpoint. The manipulation results in missing authentication. The attack can be executed remotely. The exploit is now public and may be used. Upgrading to version 5.7.1 is sufficient to fix this issue. You should upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-44109 - OpenClaw < 2026.4.15 - Authentication Bypass in Feishu Webhook and Card-Action Validation

CVE ID :CVE-2026-44109
Published : May 6, 2026, 8:16 p.m. | 3 hours, 51 minutes ago
Description :OpenClaw before 2026.4.15 contains an authentication bypass vulnerability in Feishu webhook and card-action validation that allows unauthenticated requests to reach command dispatch. Missing encryptKey configuration and blank callback tokens fail open instead of rejecting requests, enabling attackers to bypass signature verification and replay protection to execute arbitrary commands.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-44110 - OpenClaw < 2026.4.15 - Authorization Bypass in Matrix Room Control Commands via DM Pairing Store

CVE ID :CVE-2026-44110
Published : May 6, 2026, 8:16 p.m. | 3 hours, 51 minutes ago
Description :OpenClaw before 2026.4.15 contains an authorization bypass vulnerability in Matrix room control-command authorization that trusts DM pairing-store entries. Attackers with DM-paired sender IDs can execute room control commands without being in configured allowlists by posting in bot rooms, potentially enabling privileged OpenClaw behavior.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-44111 - OpenClaw < 2026.4.15 - Arbitrary Markdown File Read via QMD memory_get

CVE ID :CVE-2026-44111
Published : May 6, 2026, 8:16 p.m. | 3 hours, 51 minutes ago
Description :OpenClaw before 2026.4.15 contains an arbitrary file read vulnerability in the QMD backend memory_get function that allows callers to read any Markdown files within the workspace root. Attackers with access to the memory tool can bypass path restrictions by providing arbitrary workspace Markdown paths to read files outside canonical memory locations or indexed QMD result sets.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-44112 - OpenClaw < 2026.4.22 - Symlink Swap Race Condition in OpenShell FS Bridge Writes

CVE ID :CVE-2026-44112
Published : May 6, 2026, 8:16 p.m. | 3 hours, 51 minutes ago
Description :OpenClaw before 2026.4.22 contains a time-of-check/time-of-use race condition in OpenShell sandbox filesystem writes that allows attackers to redirect writes outside the intended mount root. Attackers can exploit symlink swaps during filesystem operations to bypass sandbox restrictions and write files outside the local mount root.
Severity: 6.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-44113 - OpenClaw < 2026.4.22 - Time-of-Check/Time-of-Use Race Condition in OpenShell FS Bridge

CVE ID :CVE-2026-44113
Published : May 6, 2026, 8:16 p.m. | 3 hours, 51 minutes ago
Description :OpenClaw before 2026.4.22 contains a time-of-check/time-of-use race condition in the OpenShell filesystem bridge that allows attackers to read files outside the intended mount root. Attackers can exploit symlink swaps during filesystem operations to bypass sandbox restrictions and access unauthorized file contents.
Severity: 6.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-44114 - OpenClaw < 2026.4.20 - Environment Variable Namespace Collision via Workspace dotenv

CVE ID :CVE-2026-44114
Published : May 6, 2026, 8:16 p.m. | 3 hours, 51 minutes ago
Description :OpenClaw before 2026.4.20 fails to properly reserve the OPENCLAW_ runtime-control environment namespace in workspace dotenv files, allowing attackers to override critical runtime variables. Malicious workspaces can set variables like OPENCLAW_GIT_DIR to manipulate trusted OpenClaw runtime behavior during source-update or installer flows.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-44115 - OpenClaw < 2026.4.22 - Shell Expansion Bypass in Unquoted Heredocs via Exec Allowlist

CVE ID :CVE-2026-44115
Published : May 6, 2026, 8:16 p.m. | 3 hours, 51 minutes ago
Description :OpenClaw before 2026.4.22 contains an exec allowlist analysis vulnerability allowing shell expansion hiding in unquoted heredoc bodies. Attackers can bypass allowlist validation by embedding shell expansion tokens in heredoc bodies to execute unapproved commands at runtime.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...