A CVSS score 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Lays (@_L4ys) of TRAPA Security' was reported to the affected vendor on: 2026-03-27, 16 days ago. The vendor is given until 2026-07-25 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A CVSS score 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Lays (@_L4ys) of TRAPA Security' was reported to the affected vendor on: 2026-03-27, 16 days ago. The vendor is given until 2026-07-25 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
A vulnerability was found in hapifhir org.hl7.fhir.core up to 6.8.x. It has been rated as problematic. The affected element is an unknown function. Performing a manipulation results in information disclosure.
This vulnerability is cataloged as CVE-2026-33180. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability identified as critical has been detected in SiYuan up to 3.6.1. This issue affects the function IsSensitivePath of the file kernel/util/path.go. The manipulation leads to path traversal.
This vulnerability is referenced as CVE-2026-33194. Remote exploitation of the attack is possible. No exploit is available.
You should upgrade the affected component.
A vulnerability described as problematic has been identified in CTEK Chargeportal. Affected is an unknown function of the component WebSocket Application Programming Interface. Executing a manipulation can lead to improper restriction of excessive authentication attempts.
This vulnerability is tracked as CVE-2026-31904. The attack can be launched remotely. No exploit exists.
A vulnerability, which was classified as problematic, was found in IGL-Technologies eParking.fi. This vulnerability affects unknown code of the component WebSocket Application Programming Interface. Such manipulation leads to improper restriction of excessive authentication attempts.
This vulnerability is documented as CVE-2026-31903. The attack can be executed remotely. There is not any exploit available.
A vulnerability was found in squidowl halloy up to 2026.4. It has been classified as critical. The affected element is an unknown function. The manipulation leads to path traversal.
This vulnerability is traded as CVE-2026-32733. It is possible to initiate the attack remotely. There is no exploit available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability classified as critical has been found in IGL-Technologies eParking.fi. This vulnerability affects unknown code of the component WebSocket Endpoint. This manipulation causes missing authentication.
This vulnerability is tracked as CVE-2026-29796. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability, which was classified as critical, has been found in IGL-Technologies eParking.fi. Affected by this vulnerability is an unknown functionality. This manipulation causes session expiration.
This vulnerability is tracked as CVE-2026-32663. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability identified as problematic has been detected in squidowl halloy up to 2026.4. This affects an unknown function. Performing a manipulation results in incorrect permission assignment.
This vulnerability is known as CVE-2026-32810. Attacking locally is a requirement. No exploit is available.
It is suggested to install a patch to address this issue.
A vulnerability classified as critical has been found in IGL-Technologies eParking.fi. Affected by this issue is some unknown functionality. This manipulation causes insufficiently protected credentials.
The identification of this vulnerability is CVE-2026-31926. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in grpc grpc-go up to 1.79.2. It has been declared as critical. Impacted is an unknown function. Such manipulation leads to improper authorization.
This vulnerability is listed as CVE-2026-33186. The attack may be performed from remote. There is no available exploit.
It is recommended to upgrade the affected component.