Latest CVE Feed

Vulnerabilities published in the last 30 days. Filter by severity, exploit status, or attack vector.

Score
Vulnerability
Published
2.8 LOW
CVE-2026-2239 — Gimp: gimp: application crash (dos) via crafted psd file due to heap-buffer-overflow

A flaw was found in GIMP. Heap-buffer-overflow vulnerability exists in the fread_pascal_string function when processing a specially crafted PSD (Photoshop Document) file. This occurs because the buff…

| Memory Corruption
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
5.3 MEDIUM
CVE-2026-2100 — P11-kit: p11-kit: null dereference via c_derivekey with specific null parameters

A flaw was found in p11-kit. A remote attacker could exploit this vulnerability by calling the C_DeriveKey function on a remote token with specific IBM kyber or IBM btc derive mechanism parameters se…

Remote | Denial of Service
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
5.4 MEDIUM
CVE-2026-21724 — Missing Protected-field Authorization in Provisioning Contact Points API

A vulnerability has been discovered in Grafana OSS where an authorization bypass in the provisioning contact points API allows users with Editor role to modify protected webhook URLs without the requ…

Remote | Authorization
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
3.1 LOW
CVE-2026-0968 — Libssh: libssh: denial of service due to malformed sftp message

A flaw was found in libssh in which a malicious SFTP (SSH File Transfer Protocol) server can exploit this by sending a malformed 'longname' field within an `SSH_FXP_NAME` message during a file listin…

Remote | Memory Corruption
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
2.2 LOW
CVE-2026-0967 — Libssh: libssh: denial of service via inefficient regular expression processing

A flaw was found in libssh. A remote attacker, by controlling client configuration files or known_hosts files, could craft specific hostnames that when processed by the `match_pattern()` function can…

| Denial of Service
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
6.5 MEDIUM
CVE-2026-0966 — Libssh: buffer underflow in ssh_get_hexa() on invalid input

The API function `ssh_get_hexa()` is vulnerable, when 0-lenght input is provided to this function. This function is used internally in `ssh_get_fingerprint_hash()` and `ssh_print_hexa()` (deprecated)…

Remote | Denial of Service
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
3.3 LOW
CVE-2026-0965 — Libssh: libssh: denial of service via improper configuration file handling

A flaw was found in libssh where it can attempt to open arbitrary files during configuration parsing. A local attacker can exploit this by providing a malicious configuration file or when the system …

| Path Traversal
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
5.0 MEDIUM
CVE-2026-0964 — Libssh: improper sanitation of paths received from scp servers

A malicious SCP server can send unexpected paths that could make the client application override local files outside of working directory. This could be misused to create malicious executable or conf…

Remote | Path Traversal
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
8.4 HIGH
CVE-2026-33632 — ClearanceKit: opfilter policy bypass via exchangedata and clone operations

ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to version 4.2.4, two file operation event types — ES_EVENT_TYPE_AUTH_EXCHANGEDATA and ES_EV…

| Misconfiguration
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
8.7 HIGH
CVE-2026-33631 — ClearanceKit: opfilter policy bypass via non-open file operations

ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. In versions on the 4.1 branch and earlier, the opfilter Endpoint Security system extension enforce…

| Authorization
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
5.1 MEDIUM
CVE-2026-33536 — ImageMagick has an Out-of-bounds Write via InterpretImageFilename

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-18 and 6.9.13-43, due to an incorrect return value on certain platforms a pointer is incr…

| Memory Corruption
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
4.0 MEDIUM
CVE-2026-33535 — ImageMagick has an Out-of-Bounds write of a zero byte in its X11 display interaction

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-18 and 6.9.13-43, an out-of-bounds write of a zero byte exists in the X11 `display` inter…

| Memory Corruption
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
4.3 MEDIUM
CVE-2026-33532 — yaml is vulnerable to Stack Overflow via deeply nested YAML collections

`yaml` is a YAML parser and serialiser for JavaScript. Parsing a YAML document with a version of `yaml` on the 1.x branch prior to 1.10.3 or on the 2.x branch prior to 2.8.3 may throw a RangeError du…

Remote | Denial of Service
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
4.9 MEDIUM
CVE-2026-33531 — InvenTree has Path Traversal In Report Templates

InvenTree is an Open Source Inventory Management System. Prior to version 1.2.6, a path traversal vulnerability in the report template engine allows a staff-level user to read arbitrary files from th…

Remote | Path Traversal
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
7.7 HIGH
CVE-2026-33530 — InvenTree Vulnerable to ORM Filter Injection

InvenTree is an Open Source Inventory Management System. Prior to version 1.2.6, certain API endpoints associated with bulk data operations can be hijacked to exfiltrate sensitive information from th…

Remote | Information Disclosure
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
3.3 LOW
CVE-2026-33529 — Zoraxy: Authenticated Path Traversal in Config Import leads to RCE

Zoraxy is a general purpose HTTP reverse proxy and forwarding tool. Prior to version 3.3.2, an authenticated path traversal vulnerability in the configuration import endpoint allows an authenticated …

Remote | Path Traversal
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
6.5 MEDIUM
CVE-2026-33528 — GoDoxy has a Path Traversal Vulnerability in its File API

GoDoxy is a reverse proxy and container orchestrator for self-hosters. Prior to version 0.27.5, the file content API endpoint at `/api/v1/file/content` is vulnerable to path traversal. The `filename`…

Remote | Path Traversal
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
0.5 LOW
CVE-2026-33525 — Authelia: Improper Neutralization of Input During Web Page Generation Leads to Potential …

Authelia is an open-source authentication and authorization server providing two-factor authentication and single sign-on (SSO) for applications via a web portal. In version 4.39.15, an attacker may …

| Cross-Site Scripting
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
0.0 NA
CVE-2026-32287 — Infinite loop in github.com/antchfx/xpath

Boolean XPath expressions that evaluate to true can cause an infinite loop in logicalQuery.Select, leading to 100% CPU usage. This can be triggered by top-level selectors such as "1=1" or "true()".

| Denial of Service
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
0.0 NA
CVE-2026-32286 — Denial of service in github.com/jackc/pgproto3/v2

The DataRow.Decode function fails to properly validate field lengths. A malicious or compromised PostgreSQL server can send a DataRow message with a negative field length, causing a slice bounds out …

| Memory Corruption
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
Showing 20 of 6096 Results