Latest CVE Feed

Vulnerabilities published in the last 30 days. Filter by severity, exploit status, or attack vector.

Score
Vulnerability
Published
0.0 NA
CVE-2026-33536 — ImageMagick has an Out-of-bounds Write via InterpretImageFilename

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-18 and 6.9.13-43, due to an incorrect return value on certain platforms a pointer is incr…

| Memory Corruption
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
0.0 NA
CVE-2026-33535 — ImageMagick has an Out-of-Bounds write of a zero byte in its X11 display interaction

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-18 and 6.9.13-43, an out-of-bounds write of a zero byte exists in the X11 `display` inter…

| Memory Corruption
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
0.0 NA
CVE-2026-33532 — yaml is vulnerable to Stack Overflow via deeply nested YAML collections

`yaml` is a YAML parser and serialiser for JavaScript. Parsing a YAML document with a version of `yaml` on the 1.x branch prior to 1.10.3 or on the 2.x branch prior to 2.8.3 may throw a RangeError du…

| Denial of Service
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
0.0 NA
CVE-2026-32287 — Infinite loop in github.com/antchfx/xpath

Boolean XPath expressions that evaluate to true can cause an infinite loop in logicalQuery.Select, leading to 100% CPU usage. This can be triggered by top-level selectors such as "1=1" or "true()".

| Denial of Service
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
0.0 NA
CVE-2026-32286 — Denial of service in github.com/jackc/pgproto3/v2

The DataRow.Decode function fails to properly validate field lengths. A malicious or compromised PostgreSQL server can send a DataRow message with a negative field length, causing a slice bounds out …

| Memory Corruption
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
0.0 NA
CVE-2026-32285 — Denial of service in github.com/buger/jsonparser

The Delete function fails to properly validate offsets when processing malformed JSON input. This can lead to a negative slice index and a runtime panic, allowing a denial of service attack.

| Denial of Service
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
0.0 NA
CVE-2026-32284 — Denial of service in github.com/shamaton/msgpack

The msgpack decoder fails to properly validate the input buffer length when processing truncated fixext data (format codes 0xd4-0xd8). This can lead to an out-of-bounds read and a runtime panic, allo…

| Memory Corruption
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
0.0 NA
CVE-2026-33531 — InvenTree has Path Traversal In Report Templates

InvenTree is an Open Source Inventory Management System. Prior to version 1.2.6, a path traversal vulnerability in the report template engine allows a staff-level user to read arbitrary files from th…

| Path Traversal
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
0.0 NA
CVE-2026-33530 — InvenTree Vulnerable to ORM Filter Injection

InvenTree is an Open Source Inventory Management System. Prior to version 1.2.6, certain API endpoints associated with bulk data operations can be hijacked to exfiltrate sensitive information from th…

| Information Disclosure
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
0.0 NA
CVE-2026-33632 — ClearanceKit: opfilter policy bypass via exchangedata and clone operations

ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to version 4.2.4, two file operation event types — ES_EVENT_TYPE_AUTH_EXCHANGEDATA and ES_EV…

| Misconfiguration
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
6.5 MEDIUM
CVE-2026-2436 — Libsoup: libsoup: denial of service via use-after-free in soupserver during tls handshake

A flaw was found in libsoup's SoupServer. A remote attacker could exploit a use-after-free vulnerability where the `soup_server_disconnect()` function frees connection objects prematurely, even if a …

Remote | Memory Corruption
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
0.0 NA
CVE-2026-33631 — ClearanceKit: opfilter policy bypass via non-open file operations

ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. In versions on the 4.1 branch and earlier, the opfilter Endpoint Security system extension enforce…

| Authorization
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
6.9 MEDIUM
CVE-2021-4474 — Ruckus AP CLI Arbitrary File Read Allows Authenticated Remote File Access

Ruckus Access Point products contain an arbitrary file read vulnerability in the command-line interface that allows authenticated remote attackers with administrative privileges to read arbitrary fil…

Remote | Path Traversal
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
0.0 NA
CVE-2026-33529 — Zoraxy: Authenticated Path Traversal in Config Import leads to RCE

Zoraxy is a general purpose HTTP reverse proxy and forwarding tool. Prior to version 3.3.2, an authenticated path traversal vulnerability in the configuration import endpoint allows an authenticated …

| Path Traversal
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
0.0 NA
CVE-2026-33528 — GoDoxy has a Path Traversal Vulnerability in its File API

GoDoxy is a reverse proxy and container orchestrator for self-hosters. Prior to version 0.27.5, the file content API endpoint at `/api/v1/file/content` is vulnerable to path traversal. The `filename`…

| Path Traversal
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
0.0 NA
CVE-2026-33525 — Authelia: Improper Neutralization of Input During Web Page Generation Leads to Potential …

Authelia is an open-source authentication and authorization server providing two-factor authentication and single sign-on (SSO) for applications via a web portal. In version 4.39.15, an attacker may …

| Cross-Site Scripting
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
7.7 HIGH
CVE-2023-7338 — Ruckus Unleashed Authenticated RCE in Gateway Mode

Ruckus Unleashed contains a remote code execution vulnerability in the web-based management interface that allows authenticated remote attackers to execute arbitrary code on the system when gateway m…

Remote | Injection
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
7.5 HIGH
CVE-2026-4926 — path-to-regexp vulnerable to Denial of Service via sequential optional groups

Impact: A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as `{a}{b}{c}:z`. The generated regex grows exponentially with the numb…

| Denial of Service
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
5.9 MEDIUM
CVE-2026-4923 — path-to-regexp vulnerable to Regular Expression Denial of Service via multiple wildcards

Impact: When using multiple wildcards, combined with at least one parameter, a regular expression can be generated that is vulnerable to ReDoS. This backtracking vulnerability requires the second wi…

| Denial of Service
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
4.3 MEDIUM
CVE-2026-3190 — Keycloak: keycloak: information disclosure via improper role enforcement in uma 2.0 prote…

A flaw was found in Keycloak. The User-Managed Access (UMA) 2.0 Protection API endpoint for permission tickets fails to enforce the `uma_protection` role check. This allows any authenticated user wit…

Remote | Authorization
Mar 26, 2026 Mar 26, 2026
Mar 26, 2026
Mar 26, 2026
Showing 20 of 6057 Results