Latest CVE Feed

Vulnerabilities published in the last 30 days. Filter by severity, exploit status, or attack vector.

Score
Vulnerability
Published
0.0 NA
CVE-2026-28689 — ImageMagick has a Path Policy TOCTOU symlink race bypass

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, domain="path" authorization is checked before final file open/…

| Path Traversal
Mar 09, 2026 Mar 09, 2026
Mar 09, 2026
Mar 09, 2026
0.0 NA
CVE-2026-28688 — ImageMagick has a heap use-after-free in the MSL encoder

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap-use-after-free vulnerability exists in the MSL encoder,…

| Memory Corruption
Mar 09, 2026 Mar 09, 2026
Mar 09, 2026
Mar 09, 2026
0.0 NA
CVE-2026-28687 — ImageMagick has a Heap Use-After-Free in ImageMagick MSL decoder

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap use-after-free vulnerability in ImageMagick's MSL decod…

| Memory Corruption
Mar 09, 2026 Mar 09, 2026
Mar 09, 2026
Mar 09, 2026
0.0 NA
CVE-2026-28686 — ImageMagick has a write heap-buffer-overflow in PCL encoder via undersized output buffer

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, A heap-buffer-overflow vulnerability exists in the PCL encode …

| Memory Corruption
Mar 09, 2026 Mar 09, 2026
Mar 09, 2026
Mar 09, 2026
0.0 NA
CVE-2026-28494 — ImageMagick affected by stack corruption through long morphology kernel names or arrays

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow exists in ImageMagick's morphology ker…

| Memory Corruption
Mar 09, 2026 Mar 09, 2026
Mar 09, 2026
Mar 09, 2026
0.0 NA
CVE-2026-28493 — ImageMagick has a Integer Overflow leading to out of bounds write in SIXEL decoder

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, an integer overflow vulnerability exists in the SIXEL decoer. The vulnerabil…

| Memory Corruption
Mar 09, 2026 Mar 09, 2026
Mar 09, 2026
Mar 09, 2026
0.0 NA
CVE-2026-28433 — Misskey lacks resource ownership validation

Misskey is an open source, federated social media platform. All Misskey servers running versions 10.93.0 and later, but prior to 2026.3.1, contain a vulnerability that allows importing other users' d…

| Authorization
Mar 09, 2026 Mar 09, 2026
Mar 09, 2026
Mar 09, 2026
0.0 NA
CVE-2026-28432 — HTTP signature verification can be bypassed

Misskey is an open source, federated social media platform. All Misskey servers prior to 2026.3.1 contain a vulnerability that allows bypassing HTTP signature verification. Although this is a vulnera…

| Misconfiguration
Mar 09, 2026 Mar 09, 2026
Mar 09, 2026
Mar 09, 2026
0.0 NA
CVE-2026-28431 — Misskey lacks proper authorization checks and input validation

Misskey is an open source, federated social media platform. All Misskey servers running versions 8.45.0 and later, but prior to 2026.3.1, contain a vulnerability that allows bad actors access to data…

| Authorization
Mar 09, 2026 Mar 09, 2026
Mar 09, 2026
Mar 09, 2026
8.8 HIGH
CVE-2026-3288 — ingress-nginx rewrite-target nginx configuration injection

A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/rewrite-target` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary c…

Remote | Injection
Mar 09, 2026 Mar 09, 2026
Mar 09, 2026
Mar 09, 2026
9.1 CRITICAL
CVE-2026-31816 — Budibase Universal Auth Bypass via Webhook Query Param Injection

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.4 and earlier, the Budibase server's authorized() middleware that protects every server-side API endp…

Remote | Authorization
Mar 09, 2026 Mar 09, 2026
Mar 09, 2026
Mar 09, 2026
9.6 CRITICAL
CVE-2026-30240 — Budibase PWA ZIP Upload Path Traversal Allows Reading Arbitrary Server Files Including Al…

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.5 and earlier, a path traversal vulnerability in the PWA (Progressive Web App) ZIP processing endpoin…

Remote | Path Traversal
Mar 09, 2026 Mar 09, 2026
Mar 09, 2026
Mar 09, 2026
7.1 HIGH
CVE-2026-25960 — SSRF Protection Bypass in vLLM

vLLM is an inference and serving engine for large language models (LLMs). The SSRF protection fix for CVE-2026-24779 add in 0.15.1 can be bypassed in the load_from_url_async method due to inconsisten…

Remote | Server-Side Request Forgery
Mar 09, 2026 Mar 09, 2026
Mar 09, 2026
Mar 09, 2026
8.9 HIGH
CVE-2026-25737 — Budibase Arbitrary File Upload Leading to Multiple Critical Vulnerabilities (SSRF, Stored…

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.24.0 and earlier, an arbitrary file upload vulnerability exists even though file extension restrictions …

Remote | Misconfiguration
Mar 09, 2026 Mar 09, 2026
Mar 09, 2026
Mar 09, 2026
8.7 HIGH
CVE-2026-25045 — Budibase Critical Privilege Escalation & IDOR via Missing RBAC on User Role Management (C…

Budibase is a low code platform for creating internal tools, workflows, and admin panels. This issue is a combination of Vertical Privilege Escalation and IDOR (Insecure Direct Object Reference) due …

Remote | Authorization
Mar 09, 2026 Mar 09, 2026
Mar 09, 2026
Mar 09, 2026
0.0 NA
CVE-2025-70973 — ScadaBR Session Fixation Vulnerability

ScadaBR 1.12.4 is vulnerable to Session Fixation. The application assigns a JSESSIONID session cookie to unauthenticated users and does not regenerate the session identifier after successful authenti…

| Authentication
Mar 09, 2026 Mar 09, 2026
Mar 09, 2026
Mar 09, 2026
0.0 NA
CVE-2025-70028 — SunbirdEd Path Traversal Vulnerability

An issue pertaining to CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') was discovered in Sunbird-Ed SunbirdEd-portal v1.13.4.

| Path Traversal
Mar 09, 2026 Mar 09, 2026
Mar 09, 2026
Mar 09, 2026
6.3 MEDIUM
CVE-2025-15603 — open-webui JWT Key start_windows.bat random values

A security vulnerability has been detected in open-webui up to 0.6.16. Affected is an unknown function of the file backend/start_windows.bat of the component JWT Key Handler. Such manipulation of the…

Remote | Cryptography
Mar 09, 2026 Mar 09, 2026
Mar 09, 2026
Mar 09, 2026
0.0 NA
CVE-2026-26982 — Ghostty affected by arbitrary command execution via control characters in paste and drag-…

Ghostty is a cross-platform terminal emulator. Ghostty allows control characters such as 0x03 (Ctrl+C) in pasted and dropped text. These can be used to execute arbitrary commands in some shell enviro…

| Injection
Mar 09, 2026 Mar 09, 2026
Mar 09, 2026
Mar 09, 2026
0.0 NA
CVE-2026-31802 — node-tar Symlink Path Traversal via Drive-Relative Linkpath

node-tar is a full-featured Tar for Node.js. Prior to version 7.5.11, tar (npm) can be tricked into creating a symlink that points outside the extraction directory by using a drive-relative symlink t…

| Path Traversal
Mar 09, 2026 Mar 09, 2026
Mar 09, 2026
Mar 09, 2026
Showing 20 of 5061 Results