8.7

CVSS4.0

CVE-2026-3013 - Path Traversal in Coppermine Photo Gallery

Coppermine Photo Gallery in versions 1.6.09 through 1.6.27Β is vulnerable to path traversal. Unauthenticated remote attacker is able to exploit a vulnerable endpoint and construct payloads that allow to read content of any file accessible by the the web server process.This issue was fixed in version…

πŸ“… Published: March 11, 2026, 2:58 p.m. πŸ”„ Last Modified: March 23, 2026, 9:55 a.m.

9.6

CVSS3.1

CVE-2026-30903 - External Control of File Name or Path in Zoom Workplace Mail Feature Leads to Privilege Escalation

External Control of File Name or Path in the Mail feature of Zoom Workplace for Windows before 6.6.0 may allow an unauthenticated user to conduct an escalation of privilege via network access.

πŸ“… Published: March 11, 2026, 2:52 p.m. πŸ”„ Last Modified: March 20, 2026, 2:37 p.m.

7.8

CVSS3.1

CVE-2026-30902 - Zoom Clients for Windows - Improper Privilege Management

Improper Privilege Management in certain Zoom Clients for Windows may allow an authenticated user to conduct an escalation of privilege via local access.

πŸ“… Published: March 11, 2026, 2:50 p.m. πŸ”„ Last Modified: March 20, 2026, 2:37 p.m.

7

CVSS3.1

CVE-2026-30901 - Zoom Rooms for Windows - Improper Input Validation

Improper Input Validation in Zoom Rooms for Windows before 6.6.5 in Kiosk Mode may allow an authenticated user to conduct an escalation of privilege via local access.

πŸ“… Published: March 11, 2026, 2:47 p.m. πŸ”„ Last Modified: March 20, 2026, 2:37 p.m.

7.8

CVSS3.1

CVE-2026-30900 - Zoom Workplace Clients for Windows - Improper Check

Improper Check of minimum version in update functionality of certain Zoom Clients for Windows may allow an authenticated user to conduct an escalation of privilege via local access.

πŸ“… Published: March 11, 2026, 2:44 p.m. πŸ”„ Last Modified: March 20, 2026, 2:37 p.m.

6.9

CVSS4.0

CVE-2026-32063 - OpenClaw 2026.2.19-2 < 2026.2.21 - Command Injection via Newline in systemd Unit Generation

OpenClaw version 2026.2.19-2 prior to 2026.2.21 contains a command injection vulnerability in systemd unit file generation where attacker-controlled environment values are not validated for CR/LF characters, allowing newline injection to break out of Environment= lines and inject arbitrary systemd …

πŸ“… Published: March 11, 2026, 1:32 p.m. πŸ”„ Last Modified: March 20, 2026, 2:37 p.m.

8.7

CVSS4.0

CVE-2026-32062 - OpenClaw 2026.2.21-2 < 2026.2.22 - Unauthenticated WebSocket Resource Exhaustion via Media Stream

OpenClaw versions2026.2.21-2 prior to 2026.2.22 and @openclaw/voice-call versions 2026.2.21 prior to 2026.2.22 accept media-stream WebSocket upgrades before stream validation, allowing unauthenticated clients to establish connections. Remote attackers can hold idle pre-authenticated sockets open to…

πŸ“… Published: March 11, 2026, 1:32 p.m. πŸ”„ Last Modified: March 27, 2026, 8:42 a.m.

6.7

CVSS4.0

CVE-2026-32061 - OpenClaw < 2026.2.17 - Arbitrary File Read via $include Directive Path Traversal

OpenClaw versions prior to 2026.2.17 contain a path traversal vulnerability in the $include directive resolution that allows reading arbitrary local files outside the config directory boundary. Attackers with config modification capabilities can exploit this by specifying absolute paths, traversal …

πŸ“… Published: March 11, 2026, 1:32 p.m. πŸ”„ Last Modified: March 20, 2026, 2:37 p.m.

8.7

CVSS4.0

CVE-2026-32060 - OpenClaw < 2026.2.14 - Path Traversal in apply_patch via Crafted Paths

OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in apply_patch that allows attackers to write or delete files outside the configured workspace directory. When apply_patch is enabled without filesystem sandbox containment, attackers can exploit crafted paths including dir…

πŸ“… Published: March 11, 2026, 1:32 p.m. πŸ”„ Last Modified: March 20, 2026, 2:37 p.m.

8.7

CVSS4.0

CVE-2026-32059 - OpenClaw 2026.2.22-2 < 2026.2.23 - Allowlist Bypass via sort Long-Option Abbreviation in tools.exec…

OpenClaw version 2026.2.22-2 prior to 2026.2.23 tools.exec.safeBins validation for sort command fails to properly validate GNU long-option abbreviations, allowing attackers to bypass denied-flag checks via abbreviated options. Remote attackers can execute sort commands with abbreviated long options…

πŸ“… Published: March 11, 2026, 1:32 p.m. πŸ”„ Last Modified: March 20, 2026, 2:37 p.m.
Total resulsts: 349182
Page 1183 of 34,919
Β« previous page Β» next page
Filters