A vulnerability was found in Zoom Workplace and VDI Client on Windows and classified as critical. Impacted is an unknown function. Executing a manipulation can lead to file inclusion.
This vulnerability appears as CVE-2026-30903. The attack may be performed from remote. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability was found in Zoom Workplace, Workplace VDI Client and Rooms up to 6.5.x on Windows. It has been classified as critical. The affected element is an unknown function. The manipulation leads to improper privilege management.
This vulnerability is traded as CVE-2026-30902. An attack has to be approached locally. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Zoom Rooms up to 6.6.4 on Windows. It has been declared as problematic. The impacted element is an unknown function. The manipulation results in improper input validation.
This vulnerability is known as CVE-2026-30901. Attacking locally is a requirement. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability was found in Zoom Workplace, Workplace VDI Client and Meeting SDK 6.6.x on Windows. It has been rated as problematic. This affects an unknown function. This manipulation causes improper check for unusual conditions.
This vulnerability is handled as CVE-2026-30900. It is possible to launch the attack on the local host. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability was found in Crocoblock JetBooking Plugin up to 4.0.3 on WordPress. It has been declared as critical. This issue affects some unknown processing. Executing a manipulation of the argument check_in_date can lead to sql injection.
This vulnerability appears as CVE-2026-3496. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in OpenClaw up to 2026.2.21. It has been rated as problematic. Impacted is an unknown function of the component voice-call. The manipulation leads to allocation of resources.
This vulnerability is traded as CVE-2026-32062. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability identified as critical has been detected in OpenClaw up to 2026.2.20. The impacted element is an unknown function of the component systemd Unit File Generation. This manipulation of the argument environment causes command injection.
This vulnerability is handled as CVE-2026-32063. It is possible to launch the attack on the local host. There is not any exploit available.
You should upgrade the affected component.
A vulnerability marked as critical has been reported in SunbirdEd Portal 1.13.4. Affected by this issue is some unknown functionality. The manipulation leads to server-side request forgery.
This vulnerability is uniquely identified as CVE-2025-70027. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability classified as problematic was found in Easy Grade Pro 4.1.0.2. This issue affects some unknown processing of the component EGP Gradebook File Handler. Such manipulation leads to denial of service.
This vulnerability is referenced as CVE-2025-70330. The attack can only be performed from a local environment. No exploit is available.
A vulnerability, which was classified as critical, has been found in Coppermine Photo Gallery up to 1.6.27. Impacted is an unknown function. Performing a manipulation results in path traversal.
This vulnerability is identified as CVE-2026-3013. The attack can be initiated remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability has been found in ClasroomIO up to 0.2.5 and classified as critical. The impacted element is an unknown function of the file /api/verify. The manipulation leads to authentication bypass by spoofing.
This vulnerability is listed as CVE-2025-67298. The attack may be initiated remotely. There is no available exploit.
The affected component should be upgraded.
A vulnerability was found in JetBrains Hub up to 2026.0 and classified as critical. This affects an unknown function. The manipulation results in authentication bypass by spoofing.
This vulnerability is cataloged as CVE-2026-32229. The attack may be launched remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in PluXml up to 5.8.22. Affected is an unknown function of the component Anti Spam-Captcha. The manipulation results in an unknown weakness.
This vulnerability is cataloged as CVE-2025-70129. The attack may be launched remotely. There is no exploit available.