A vulnerability was found in Tips and Tricks HQ WP eMember Plugin up to 10.2.2 on WordPress. It has been declared as problematic. This affects an unknown part. The manipulation results in cross site scripting.
This vulnerability is reported as CVE-2026-28073. The attack can be launched remotely. No exploit exists.
A vulnerability was found in WP Media WP Rocket Plugin up to 3.19.4 on WordPress. It has been classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is documented as CVE-2026-28044. The attack can be initiated remotely. There is not any exploit available.
A vulnerability was found in OpenClaw up to 2026.2.23 and classified as problematic. Affected by this vulnerability is an unknown functionality. Executing a manipulation can lead to incorrect authorization.
This vulnerability is registered as CVE-2026-31998. It is possible to launch the attack remotely. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability has been found in OpenClaw up to 2026.2.18 and classified as critical. Affected is an unknown function of the component Windows Scheduled Task Script Generation. Performing a manipulation results in os command injection.
This vulnerability is cataloged as CVE-2026-31994. The attack must be initiated from a local position. There is no exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, was found in OpenClaw up to 2026.3.0. This impacts the function web_search of the component Network Request Handler. Such manipulation leads to server-side request forgery.
This vulnerability is listed as CVE-2026-31989. The attack may be performed from remote. There is no available exploit.
You should upgrade the affected component.
Системы файлового аудита (DCAP) привычно используют, чтобы навести порядок в хранении данных и настроить к ним доступ. Но система может больше. Разберем, как такие решения обнаруживают уязвимые данные, создают безопасные сценарии их обработки и борются с нарушениями.
A vulnerability, which was classified as critical, has been found in OpenClaw up to 2026.2.21. This affects an unknown function. This manipulation causes incomplete blacklist.
This vulnerability is tracked as CVE-2026-31993. The attack is possible to be carried out remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic was found in IBM QRadar SIEM up to 7.5.0 UP14. The impacted element is an unknown function of the component Configuration Handler. The manipulation results in file and directory information exposure.
This vulnerability is identified as CVE-2025-36051. The attack is only possible with local access. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability classified as critical has been found in OpenClaw up to 2026.3.1. The affected element is an unknown function of the component system.run node-host Execution. The manipulation leads to argument injection.
This vulnerability is referenced as CVE-2026-29608. The attack can only be performed from a local environment. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability described as problematic has been identified in OpenClaw up to 2026.3.1. Impacted is an unknown function of the component ZIP Extraction. Executing a manipulation can lead to time-of-check time-of-use.
The identification of this vulnerability is CVE-2026-27670. The attack can only be executed locally. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability marked as problematic has been reported in veronalabs SlimStat Analytics Plugin up to 5.3.5 on WordPress. This issue affects some unknown processing. Performing a manipulation results in cross site scripting.
This vulnerability was named CVE-2026-1238. The attack may be initiated remotely. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in OpenClaw up to 2026.2.18. This vulnerability affects unknown code of the component Command Argument Handler. Such manipulation leads to os command injection.
This vulnerability is uniquely identified as CVE-2026-32000. Local access is required to approach this attack. No exploit exists.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in Tips and Tricks HQ WP eMember Plugin up to 10.2.2 on WordPress. This affects an unknown part. This manipulation causes missing authorization.
This vulnerability is handled as CVE-2026-28070. The attack can be initiated remotely. There is not any exploit available.