A vulnerability was found in toxicbishop DSA-with-tsx. It has been declared as problematic. Impacted is an unknown function of the file server/routes/auth.js. Executing a manipulation can lead to missing encryption of sensitive data.
The identification of this vulnerability is CVE-2026-28678. The attack may be launched remotely. There is no exploit available.
It is advisable to implement a patch to correct this issue.
A vulnerability has been found in parse-community parse-server up to 8.6.9/9.5.0-alpha.10 and classified as critical. This affects an unknown part of the component Configuration Options Handler. This manipulation causes improper authentication.
This vulnerability is handled as CVE-2026-30863. The attack can be initiated remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability was found in gravitl netmaker up to 1.4.x and classified as critical. This vulnerability affects unknown code of the component Endpoint. Such manipulation leads to incorrect authorization.
This vulnerability is uniquely identified as CVE-2026-29194. The attack can be launched remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability marked as critical has been reported in parse-community parse-server up to 8.6.7/9.5.0-alpha.7. Affected is an unknown function. Performing a manipulation results in path traversal.
This vulnerability is cataloged as CVE-2026-30848. It is possible to initiate the attack remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability described as problematic has been identified in parse-community parse-server up to 8.6.8/9.5.0-alpha.8. Affected by this vulnerability is an unknown functionality of the file /files/:appId/metadata/:filename of the component File Metadata Endpoint. Executing a manipulation can lead to missing authorization.
This vulnerability is registered as CVE-2026-30850. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability, which was classified as problematic, was found in gravitl netmaker up to 1.4.x. This issue affects some unknown processing of the file /api/users/. Such manipulation of the argument Username leads to incorrect authorization.
This vulnerability is traded as CVE-2026-29195. The attack may be launched remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability has been found in gravitl netmaker up to 1.4.x and classified as problematic. Impacted is an unknown function of the file /api/extclients/ of the component API Endpoint. Performing a manipulation of the argument Network results in incorrect authorization.
This vulnerability is known as CVE-2026-29196. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
A vulnerability classified as problematic has been found in parse-community parse-server up to 9.5.0-alpha.9. Affected by this issue is some unknown functionality of the component graphQLPublictrospection. The manipulation leads to incorrect authorization.
This vulnerability is documented as CVE-2026-30854. The attack can be initiated remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability identified as problematic has been detected in Mendi Neurofeedback Headset V4. Affected by this vulnerability is an unknown functionality of the component Bluetooth Low Energy Handler. Performing a manipulation results in cleartext transmission of sensitive information.
This vulnerability is identified as CVE-2026-2671. The attack can only be performed from the local network. There is not any exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as critical, has been found in Huawei HarmonyOS 5.1.0/6.0.0. This affects an unknown part of the component Resource Scheduling Module. The manipulation leads to improper access controls.
This vulnerability is referenced as CVE-2025-66319. The attack can only be performed from a local environment. No exploit is available.
A vulnerability identified as problematic has been detected in Huawei HarmonyOS 5.1.0/6.0.0. Affected is an unknown function of the component Certificate Management Module. This manipulation causes path traversal: '../filedir'.
This vulnerability appears as CVE-2026-28538. The attack requires local access. There is no available exploit.
A vulnerability labeled as problematic has been found in Huawei HarmonyOS 5.1.0/6.0.0. Affected by this vulnerability is an unknown functionality. Such manipulation leads to improper neutralization of null byte or nul character.
This vulnerability is traded as CVE-2026-28540. An attack has to be approached locally. There is no exploit available.
A vulnerability marked as problematic has been reported in Huawei HarmonyOS 5.1.0/6.0.0. Affected by this issue is some unknown functionality of the component Data Handler. Performing a manipulation results in data processing error.
This vulnerability is known as CVE-2026-28539. Attacking locally is a requirement. No exploit is available.
A vulnerability described as critical has been identified in Huawei HarmonyOS 5.1.0/6.0.0. This affects an unknown part of the component cellular_data Module. Executing a manipulation can lead to improper access controls.
This vulnerability is handled as CVE-2026-28541. It is possible to launch the attack on the local host. There is not any exploit available.
A vulnerability classified as problematic has been found in Huawei HarmonyOS 5.1.0/6.0.0. This vulnerability affects unknown code of the component Maintenance Module. The manipulation leads to race condition.
This vulnerability is uniquely identified as CVE-2026-28543. Local access is required to approach this attack. No exploit exists.
A vulnerability was found in Huawei HarmonyOS 5.1.0/6.0.0. It has been declared as very critical. The affected element is an unknown function of the component Device Authentication Module. Such manipulation leads to authentication bypass by primary weakness.
This vulnerability is traded as CVE-2026-28536. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability was found in Huawei HarmonyOS 6.0.0. It has been declared as problematic. This issue affects some unknown processing of the component Window Module. Such manipulation leads to double free.
This vulnerability is documented as CVE-2026-28537. The attack needs to be performed locally. There is not any exploit available.
A vulnerability was found in Media Library Assistant Plugin up to 3.33 on WordPress and classified as problematic. This issue affects the function mla_update_compat_fields_action of the component Attachment Taxonomy Handler. Executing a manipulation can lead to missing authorization.
The identification of this vulnerability is CVE-2026-3072. The attack may be launched remotely. There is no exploit available.