A vulnerability was found in caddyserver caddy up to 2.11.1. It has been classified as problematic. The impacted element is the function repl.ReplaceAll of the component Request Header Handler. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2026-30852. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is recommended.
White House released President Trump’s Cyber Strategy for America, framing cyberspace as a strategic domain to project power and counter growing cyber threats The White House has released “President Trump’s Cyber Strategy for America,” a document that outlines how the United States intends to maintain dominance in cyberspace and confront an increasingly hostile digital landscape. […]
A vulnerability was found in Tencent WeKnora up to 0.2.x and classified as critical. The affected element is an unknown function of the component web_fetch. Executing a manipulation can lead to server-side request forgery.
This vulnerability is handled as CVE-2026-30858. The attack can be executed remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in gravitl netmaker up to 1.4.x and classified as problematic. Impacted is an unknown function of the file /api/extclients/ of the component API Endpoint. Performing a manipulation of the argument Network results in incorrect authorization.
This vulnerability is known as CVE-2026-29196. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in gravitl netmaker up to 1.4.x. This issue affects some unknown processing of the file /api/users/. Such manipulation of the argument Username leads to incorrect authorization.
This vulnerability is traded as CVE-2026-29195. The attack may be launched remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Tencent WeKnora up to 0.3.1. This vulnerability affects unknown code of the component Tenant Management Endpoint. This manipulation causes improper access controls.
This vulnerability appears as CVE-2026-30855. The attack may be initiated remotely. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic was found in yhirose cpp-httplib up to 0.36.x. This affects the function std::regex of the component Content-Disposition Parser. The manipulation results in uncontrolled recursion.
This vulnerability is reported as CVE-2026-29076. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability classified as problematic has been found in parse-community parse-server up to 9.5.0-alpha.9. Affected by this issue is some unknown functionality of the component graphQLPublictrospection. The manipulation leads to incorrect authorization.
This vulnerability is documented as CVE-2026-30854. The attack can be initiated remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability described as problematic has been identified in parse-community parse-server up to 8.6.8/9.5.0-alpha.8. Affected by this vulnerability is an unknown functionality of the file /files/:appId/metadata/:filename of the component File Metadata Endpoint. Executing a manipulation can lead to missing authorization.
This vulnerability is registered as CVE-2026-30850. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in parse-community parse-server up to 8.6.7/9.5.0-alpha.7. Affected is an unknown function. Performing a manipulation results in path traversal.
This vulnerability is cataloged as CVE-2026-30848. It is possible to initiate the attack remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in Tencent WeKnora up to 0.2.11. This impacts an unknown function of the component Private Message Handler. Such manipulation leads to improper access controls.
This vulnerability is listed as CVE-2026-30859. The attack may be performed from remote. There is no available exploit.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in Tencent WeKnora up to 0.2.x. This affects an unknown function of the component Knowledge Base Copy Endpoint. This manipulation causes authorization bypass.
This vulnerability is tracked as CVE-2026-30857. The attack is possible to be carried out remotely. No exploit exists.
You should upgrade the affected component.
A vulnerability categorized as problematic has been discovered in Tencent WeKnora up to 0.2.x. The impacted element is the function tavily_extract. The manipulation results in incorrectly-resolved name.
This vulnerability is identified as CVE-2026-30856. The attack can be executed remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in charmbracelet soft-serve up to 0.11.3. It has been rated as critical. The affected element is an unknown function. The manipulation leads to server-side request forgery.
This vulnerability is referenced as CVE-2026-30832. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is advised.
A vulnerability was found in toxicbishop DSA-with-tsx. It has been declared as problematic. Impacted is an unknown function of the file server/routes/auth.js. Executing a manipulation can lead to missing encryption of sensitive data.
The identification of this vulnerability is CVE-2026-28678. The attack may be launched remotely. There is no exploit available.
It is advisable to implement a patch to correct this issue.
A vulnerability was found in thephpleague commonmark up to 2.8.0. It has been classified as problematic. This issue affects some unknown processing of the component PHP Markdown Parser. Performing a manipulation results in cross site scripting.
This vulnerability was named CVE-2026-30838. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability was found in gravitl netmaker up to 1.4.x and classified as critical. This vulnerability affects unknown code of the component Endpoint. Such manipulation leads to incorrect authorization.
This vulnerability is uniquely identified as CVE-2026-29194. The attack can be launched remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability has been found in parse-community parse-server up to 8.6.9/9.5.0-alpha.10 and classified as critical. This affects an unknown part of the component Configuration Options Handler. This manipulation causes improper authentication.
This vulnerability is handled as CVE-2026-30863. The attack can be initiated remotely. There is not any exploit available.
The affected component should be upgraded.