A vulnerability was found in Micca Auto Electronics Car Alarm System KE700/KE700+. It has been declared as problematic. Impacted is an unknown function. Such manipulation leads to insufficient entropy.
This vulnerability is uniquely identified as CVE-2026-2541. The attack can only be initiated within the local network. No exploit exists.
A vulnerability was found in Micca Auto Electronics Car Alarm System KE700/KE700+. It has been classified as critical. This issue affects some unknown processing. This manipulation causes authentication bypass using alternate channel.
This vulnerability is handled as CVE-2026-2540. The attack can only be done within the local network. There is not any exploit available.
A vulnerability was found in JUNG eNet SMART HOME server 2.2.1 (46056)/2.3.1 (46841) and classified as problematic. This vulnerability affects the function deleteUserAccount of the file /jsonrpc/management of the component HTTP POST Request Handler. The manipulation of the argument Username results in missing authorization.
This vulnerability is known as CVE-2026-26367. It is possible to launch the attack remotely. No exploit is available.
A vulnerability has been found in Bosch Infotainment System ECU 283C30861E and classified as critical. This affects an unknown part of the component Kernel Module. The manipulation leads to improper verification of cryptographic signature.
This vulnerability is traded as CVE-2025-32060. An attack has to be approached locally. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, was found in Micca Auto Electronics Car Alarm System KE700/KE700+. Affected by this issue is some unknown functionality of the component RF Communication. Executing a manipulation can lead to cleartext transmission of sensitive information.
This vulnerability appears as CVE-2026-2539. The attacker needs to be present on the local network. There is no available exploit.
A vulnerability, which was classified as critical, has been found in Bosch Infotainment System ECU 283C30861E. Affected by this vulnerability is an unknown functionality of the component Bluetooth Stack. Performing a manipulation results in stack-based buffer overflow.
This vulnerability is reported as CVE-2025-32062. The attacker must have access to the local network to execute the attack. Moreover, an exploit is present.
A vulnerability classified as critical was found in Bosch Infotainment System ECU 283C30861E. Affected is an unknown function of the component Bluetooth Stack. Such manipulation leads to stack-based buffer overflow.
This vulnerability is documented as CVE-2025-32061. The attack requires being on the local network. Additionally, an exploit exists.
A vulnerability classified as critical has been found in Bosch Infotainment System ECU 283C30861E on Linux. This impacts an unknown function of the component Bluetooth Stack. This manipulation causes stack-based buffer overflow.
This vulnerability is registered as CVE-2025-32059. The attack requires access to the local network. Furthermore, an exploit is available.
A vulnerability described as problematic has been identified in OPNsense 19.1. This affects an unknown function of the file system_advanced_sysctl.php of the component POST Request Handler. The manipulation of the argument Value results in cross site scripting.
This vulnerability is cataloged as CVE-2019-25377. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability marked as problematic has been reported in OPNsense 19.1. The impacted element is an unknown function of the file firewall_rules_edit.php. The manipulation of the argument Category leads to cross site scripting.
This vulnerability is listed as CVE-2019-25373. The attack may be initiated remotely. In addition, an exploit is available.
A vulnerability labeled as problematic has been found in OPNsense 19.1. The affected element is an unknown function of the file vpn_ipsec_settings.php. Executing a manipulation of the argument passthrough_networks can lead to cross site scripting.
This vulnerability is tracked as CVE-2019-25374. The attack can be launched remotely. Moreover, an exploit is present.
A vulnerability identified as problematic has been detected in OPNsense 19.1. Impacted is an unknown function of the file diag_traceroute.php. Performing a manipulation of the argument host results in cross site scripting.
This vulnerability is identified as CVE-2019-25372. The attack can be initiated remotely. Additionally, an exploit exists.
A vulnerability categorized as problematic has been discovered in OPNsense 19.1. This issue affects some unknown processing of the file diag_ping.php of the component POST Request Handler. Such manipulation of the argument host leads to cross site scripting.
This vulnerability is referenced as CVE-2019-25371. It is possible to launch the attack remotely. Furthermore, an exploit is available.
A vulnerability was found in OPNsense 19.1. It has been rated as problematic. This vulnerability affects unknown code of the file interfaces_vlan_edit.php. This manipulation of the argument tag/descr/vlanif causes cross site scripting.
The identification of this vulnerability is CVE-2019-25370. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in OPNsense 19.1. It has been declared as problematic. This affects an unknown part of the file system_advanced_sysctl.php of the component POST Request Handler. The manipulation of the argument tunable results in cross site scripting.
This vulnerability was named CVE-2019-25369. The attack may be performed from remote. In addition, an exploit is available.
A vulnerability was found in OPNsense 19.1. It has been classified as problematic. Affected by this issue is some unknown functionality of the file diag_backup.php. The manipulation of the argument GDrive_GDriveEmail/GDrive_GDriveFolderID/GDrive_GDriveBackupCount/Nextcloud_url/Nextcloud_user/Nextcloud_password/Nextcloud_password_encryption/Nextcloud_backupdir leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2019-25368. The attack is possible to be carried out remotely. Moreover, an exploit is present.
A vulnerability was found in Total VPN 0.5.29.0 on Windows and classified as problematic. Affected by this vulnerability is an unknown functionality of the file C:\Program Files\Total VPN\win-service.exe. Executing a manipulation can lead to unquoted search path.
This vulnerability is handled as CVE-2026-2542. It is possible to launch the attack on the local host. There is not any exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.