Last week, the GreyNoise Observation Grid observed something unusual: 242,666 new scanning IPs geolocating to Hong Kong appeared in seven days and 99.7% of them never completed a single TCP connection.
A vulnerability has been found in Mozilla Firefox up to 148 and classified as critical. The impacted element is an unknown function of the component Telemetry. The manipulation leads to sandbox issue.
This vulnerability is listed as CVE-2026-4687. The attack may be initiated remotely. There is no available exploit.
The affected component should be upgraded.
A vulnerability categorized as critical has been discovered in Mozilla Firefox up to 148. This issue affects some unknown processing of the component Canvas2D. The manipulation results in memory corruption.
This vulnerability is reported as CVE-2026-4707. The attack can be launched remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Mozilla Firefox up to 148. The affected element is an unknown function of the component Canvas2D. Executing a manipulation can lead to memory corruption.
This vulnerability is tracked as CVE-2026-4686. The attack can be launched remotely. No exploit exists.
You should upgrade the affected component.
A vulnerability was found in Mozilla Firefox up to 148. It has been rated as critical. This vulnerability affects unknown code of the component Canvas2D. The manipulation leads to memory corruption.
This vulnerability is documented as CVE-2026-4706. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability identified as critical has been detected in Microsoft Purview. Affected by this vulnerability is an unknown functionality. The manipulation leads to server-side request forgery.
This vulnerability is uniquely identified as CVE-2026-26138. The attack is possible to be carried out remotely. No exploit exists.
This product is a managed service, so users are unable to manage vulnerability countermeasures on their own.
A vulnerability marked as critical has been reported in OpenClaw up to 2026.2.22. This vulnerability affects unknown code of the component apply_patch Tool. Performing a manipulation results in path traversal.
This vulnerability is known as CVE-2026-32007. Remote exploitation of the attack is possible. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability described as problematic has been identified in OpenClaw up to 2026.2.24. Affected is the function block_action/view_submission/view_closed. Such manipulation leads to incorrect authorization.
This vulnerability is traded as CVE-2026-32005. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability classified as problematic has been found in OpenClaw up to 2026.2.25. Affected by this vulnerability is an unknown functionality of the component Send Message Handler. Performing a manipulation results in incorrect authorization.
This vulnerability is known as CVE-2026-32006. Remote exploitation of the attack is possible. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in OpenClaw up to 2026.2.24. Affected by this issue is some unknown functionality. Executing a manipulation can lead to link following.
This vulnerability is handled as CVE-2026-32013. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability was found in OpenClaw up to 2026.2.25 and classified as critical. This affects an unknown function. Executing a manipulation of the argument deviceFamily can lead to authentication bypass by spoofing.
The identification of this vulnerability is CVE-2026-32014. The attack needs to be done within the local network. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in OpenClaw up to 2026.2.18. It has been classified as problematic. This impacts the function tools.exec.safeBins. The manipulation leads to untrusted search path.
This vulnerability is referenced as CVE-2026-32015. The attack can only be performed from a local environment. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability labeled as problematic has been found in OpenClaw up to 2026.2.20. The affected element is the function assertBrowserNavigationAllowed. The manipulation results in externally controlled reference.
This vulnerability is cataloged as CVE-2026-32008. The attack may be launched remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability marked as problematic has been reported in OpenClaw up to 2026.2.23. The impacted element is an unknown function of the file /opt/homebrew/bin of the component Binary Handler. This manipulation causes untrusted search path.
This vulnerability is registered as CVE-2026-32009. The attack needs to be launched locally. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability classified as problematic was found in OpenClaw up to 2026.2.21. Affected is an unknown function of the file /echo. Executing a manipulation can lead to untrusted search path.
This vulnerability appears as CVE-2026-32016. The attack requires local access. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability has been found in ctfer-io romeo up to 0.2.1 and classified as critical. This issue affects the function sanitizeArchivePath of the file webserver/api/v1/decoder.go of the component Tar Handler. The manipulation leads to path traversal.
This vulnerability is documented as CVE-2026-32805. The attack can be initiated remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in OpenClaw up to 2026.3.1. Affected by this issue is some unknown functionality of the component BlueBubbles/Google Chat. This manipulation causes allocation of resources.
This vulnerability appears as CVE-2026-32011. The attack may be initiated remotely. There is no available exploit.
You should upgrade the affected component.
A vulnerability classified as problematic was found in IBM QRadar SIEM up to 7.5.0 UP14. The impacted element is an unknown function of the component Configuration Handler. The manipulation results in file and directory information exposure.
This vulnerability is identified as CVE-2025-36051. The attack is only possible with local access. There is not any exploit available.
Upgrading the affected component is advised.