2.3

CVSS4.0

CVE-2026-2671 - Mendi Neurofeedback Headset Bluetooth Low Energy cleartext transmission

A vulnerability was detected in Mendi Neurofeedback Headset V4. Affected by this vulnerability is an unknown functionality of the component Bluetooth Low Energy Handler. Performing a manipulation results in cleartext transmission of sensitive information. The attack can only be performed from the l…

📅 Published: March 7, 2026, 6:02 p.m. 🔄 Last Modified: April 22, 2026, 9:27 p.m.

10

CVSS3.1

CVE-2026-30861 - WeKnora: Remote Code Execution (RCE) via Command Injection in MCP Stdio Configuration Validation

WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. From version 0.2.5 to before version 0.2.10, an unauthenticated remote code execution (RCE) vulnerability exists in the MCP stdio configuration validation. The application allows unrestricted user r…

📅 Published: March 7, 2026, 4:38 p.m. 🔄 Last Modified: April 16, 2026, 11 a.m.

10

CVSS3.1

CVE-2026-30860 - WeKnora: Remote Code Execution via SQL Injection Bypass in AI Database Query Tool

WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.12, a remote code execution (RCE) vulnerability exists in the application's database query functionality. The validation system fails to recursively inspect child nodes within P…

📅 Published: March 7, 2026, 4:36 p.m. 🔄 Last Modified: April 16, 2026, 11 a.m.

5.3

CVSS3.1

CVE-2026-30859 - WeKnora: Broken Access Control - Cross-Tenant Data Exposure

WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.12, a broken access control vulnerability in the database query tool allows any authenticated tenant to read sensitive data belonging to other tenants, including API keys, model…

📅 Published: March 7, 2026, 4:35 p.m. 🔄 Last Modified: April 16, 2026, 11 a.m.

6.5

CVSS3.1

CVE-2026-30858 - WeKnora: DNS Rebinding Vulnerability in web_fetch Tool Allows SSRF to Internal Resources

WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.0, a DNS rebinding vulnerability in the web_fetch tool allows an unauthenticated attacker to bypass URL validation and access internal resources on the server, including private…

📅 Published: March 7, 2026, 4:34 p.m. 🔄 Last Modified: April 16, 2026, 11 a.m.

5.3

CVSS3.1

CVE-2026-30857 - WeKnora: Unauthorized Cross‑Tenant Knowledge Base Cloning

WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.0, a cross-tenant authorization bypass in the knowledge base copy endpoint allows any authenticated user to clone (duplicate) another tenant’s knowledge base into their own tena…

📅 Published: March 7, 2026, 4:33 p.m. 🔄 Last Modified: April 17, 2026, 12:15 p.m.

5.9

CVSS3.1

CVE-2026-30856 - WeKnora: Tool Execution Hijacking via Ambigous Naming Convention In MCP client and Indirect Prompt …

WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.0, a vulnerability involving tool name collision and indirect prompt injection allows a malicious remote MCP server to hijack tool execution. By exploiting an ambiguous naming …

📅 Published: March 7, 2026, 4:32 p.m. 🔄 Last Modified: April 16, 2026, 11 a.m.

8.8

CVSS3.1

CVE-2026-30855 - WeKnora: Broken Access Control in Tenant Management

WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.2, an authorization bypass in tenant management endpoints of WeKnora application allows any authenticated user to read, modify, or delete any tenant by ID. Since account registr…

📅 Published: March 7, 2026, 4:31 p.m. 🔄 Last Modified: April 16, 2026, 11 a.m.

8.1

CVSS3.1

CVE-2026-30851 - Caddy forward_auth copy_headers Does Not Strip Client-Supplied Headers, Allowing Identity Injection…

Caddy is an extensible server platform that uses TLS by default. From version 2.10.0 to before version 2.11.2, forward_auth copy_headers does not strip client-supplied headers, allowing identity injection and privilege escalation. This issue has been patched in version 2.11.2.

📅 Published: March 7, 2026, 4:28 p.m. 🔄 Last Modified: April 16, 2026, 11 a.m.

5.5

CVSS4.0

CVE-2026-30852 - Caddy: vars_regexp double-expands user input, leaking env vars and files

Caddy is an extensible server platform that uses TLS by default. From version 2.7.5 to before version 2.11.2, the vars_regexp matcher in vars.go:337 double-expands user-controlled input through the Caddy replacer. When vars_regexp matches against a placeholder like {http.request.header.X-Input}, th…

📅 Published: March 7, 2026, 4:28 p.m. 🔄 Last Modified: April 18, 2026, 10 a.m.
Total resulsts: 349182
Page 1259 of 34,919
« previous page » next page
Filters