Latest CVE Feed

Vulnerabilities published in the last 30 days. Filter by severity, exploit status, or attack vector.

Score
Vulnerability
Published
6.1 MEDIUM
CVE-2025-62403 — Canva Affinity EMF Out-of-Bounds Read

An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds …

| Information Disclosure
Mar 17, 2026 Mar 17, 2026
Mar 17, 2026
Mar 17, 2026
6.1 MEDIUM
CVE-2025-61979 — Canva Affinity EMF Out-of-Bounds Read Vulnerability

An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds …

| Memory Corruption
Mar 17, 2026 Mar 17, 2026
Mar 17, 2026
Mar 17, 2026
6.1 MEDIUM
CVE-2025-61952 — Canva Affinity EMF Out-of-Bounds Read Vulnerability

An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds …

| Information Disclosure
Mar 17, 2026 Mar 17, 2026
Mar 17, 2026
Mar 17, 2026
6.1 MEDIUM
CVE-2025-58427 — Canva Affinity EMF Out-of-Bounds Read Vulnerability

An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds …

| Information Disclosure
Mar 17, 2026 Mar 17, 2026
Mar 17, 2026
Mar 17, 2026
6.1 MEDIUM
CVE-2025-47873 — Canva Affinity EMF Out-of-Bounds Read Vulnerability

An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds …

| Information Disclosure
Mar 17, 2026 Mar 17, 2026
Mar 17, 2026
Mar 17, 2026
7.5 HIGH
CVE-2026-4319 — code-projects Simple Food Order System add-item.php sql injection

A vulnerability was identified in code-projects Simple Food Order System 1.0. Affected by this vulnerability is an unknown functionality of the file /routers/add-item.php. Such manipulation of the ar…

Remote | Injection
Mar 17, 2026 Mar 17, 2026
Mar 17, 2026
Mar 17, 2026
9.1 CRITICAL
CVE-2026-32298 — Angeet ES3 KVM OS command injection

The Angeet ES3 KVM does not properly sanitize user-supplied variables parsed by the 'cfg.lua' script, allowing an authenticated attacker to execute OS-level commands.

Remote | Injection
Mar 17, 2026 Mar 17, 2026
Mar 17, 2026
Mar 17, 2026
7.5 HIGH
CVE-2026-32297 — Angeet ES3 KVM unauthenticated arbitrary file write

The Angeet ES3 KVM allows a remote, unauthenticated attacker to write arbitrary files, including configuration files or system binaries. Modified configuration files or system binaries could allow an…

Remote | Path Traversal
Mar 17, 2026 Mar 17, 2026
Mar 17, 2026
Mar 17, 2026
8.2 HIGH
CVE-2026-32296 — Sipeed NanoKVM unauthenticated Wi-Fi configuration endpoint

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi networ…

Remote | Authentication
Mar 17, 2026 Mar 17, 2026
Mar 17, 2026
Mar 17, 2026
7.5 HIGH
CVE-2026-32295 — JetKVM insufficient login rate limiting

JetKVM before 0.5.4 does not rate limit login requests, enabling brute-force attempts to guess credentials.

Remote | Authentication
Mar 17, 2026 Mar 17, 2026
Mar 17, 2026
Mar 17, 2026
4.7 MEDIUM
CVE-2026-32294 — JetKVM insufficient firmware verification

JetKVM prior to 0.5.4 does not verify the authenticity of downloaded firmware files. An attacker-in-the-middle or a compromised update server could modify the firmware and the corresponding SHA256 ha…

| Misconfiguration
Mar 17, 2026 Mar 17, 2026
Mar 17, 2026
Mar 17, 2026
3.7 LOW
CVE-2026-32293 — GL-iNet Comet (GL-RM1) KVM insufficient certificate validation

The GL-iNet Comet (GL-RM1) KVM connects to a GL-iNet site during boot-up to provision client and CA certificates. The GL-RM1 does not verify certificates used for this connection, allowing an attacke…

Remote | Authentication
Mar 17, 2026 Mar 17, 2026
Mar 17, 2026
Mar 17, 2026
7.5 HIGH
CVE-2026-32292 — GL-iNet Comet (GL-RM1) KVM insufficient login rate-limiting

The GL-iNet Comet (GL-RM1) KVM web interface does not limit login requests, enabling brute-force attempts to guess credentials.

Remote | Authentication
Mar 17, 2026 Mar 17, 2026
Mar 17, 2026
Mar 17, 2026
6.8 MEDIUM
CVE-2026-32291 — GL-iNet Comet (GL-RM1) KVM unauthenticated root access via UART serial console

The GL-iNet Comet (GL-RM1) KVM does not require authentication on the UART serial console. This attack requires physically opening the device and connecting to the UART pins.

| Authentication
Mar 17, 2026 Mar 17, 2026
Mar 17, 2026
Mar 17, 2026
4.7 MEDIUM
CVE-2026-32290 — GL-iNet Comet (GL-RM1) KVM insufficient firmware verification

The GL-iNet Comet (GL-RM1) KVM does not sufficiently verify the authenticity of uploaded firmware files. An attacker-in-the-middle or a compromised update server could modify the firmware and the cor…

| Misconfiguration
Mar 17, 2026 Mar 17, 2026
Mar 17, 2026
Mar 17, 2026
9.1 CRITICAL
CVE-2026-25770 — Wazuh has Privilege Escalation to Root via Cluster Protocol File Write

Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 3.9.0 and prior to version 4.14.3, a privilege escalation vulnerability exists in the…

Remote | Authentication
Mar 17, 2026 Mar 17, 2026
Mar 17, 2026
Mar 17, 2026
9.1 CRITICAL
CVE-2026-25769 — Wazuh Cluster vulnerable to Remote Code Execution via Insecure Deserialization

Wazuh is a free and open source platform used for threat prevention, detection, and response. Versions 4.0.0 through 4.14.2 have a Remote Code Execution (RCE) vulnerability due to Deserialization of …

Remote | Injection
Mar 17, 2026 Mar 17, 2026
Mar 17, 2026
Mar 17, 2026
9.1 CRITICAL
CVE-2026-25534 — Spinnaker clouddriver and orca URL validation bypass via underscores in hostnames

### Impact Spinnaker updated URL Validation logic on user input to provide sanitation on user inputted URLs for clouddriver. However, they missed that Java URL objects do not correctly handle unders…

Remote | Server-Side Request Forgery
Mar 17, 2026 Mar 17, 2026
Mar 17, 2026
Mar 17, 2026
8.6 HIGH
CVE-2026-21570 — Atlassian Bamboo Data Center Remote Code Execution Vulnerability

This High severity RCE (Remote Code Execution)  vulnerability was introduced in versions 9.6.0, 10.0.0, 10.1.0, 10.2.0, 11.0.0, 11.1.0, 12.0.0, and 12.1.0 of Bamboo Data Center. This RCE (Remote C…

Remote | Injection
Mar 17, 2026 Mar 17, 2026
Mar 17, 2026
Mar 17, 2026
8.8 HIGH
CVE-2026-4148 — ExpressionContext use-after-free in classic engine $lookup and $graphLookup aggregation o…

A use-after-free vulnerability can be triggered in sharded clusters by an authenticated user with the read role who issues a specially crafted $lookup or $graphLookup aggregation pipeline.

Remote | Memory Corruption
Mar 17, 2026 Mar 17, 2026
Mar 17, 2026
Mar 17, 2026
Showing 20 of 5373 Results