Latest CVE Feed

Vulnerabilities published in the last 30 days. Filter by severity, exploit status, or attack vector.

Score
Vulnerability
Published
7.2 HIGH
CVE-2026-28673 — xiaoheiFS Vulnerable to RCE via Unrestricted Plugin Installation (Manifest Manipulation)

xiaoheiFS is a self-hosted financial and operational system for cloud service businesses. In versions up to and including 0.3.15, the standard plugin system allows admins to upload a ZIP file contain…

Remote | Injection
Mar 18, 2026 Mar 18, 2026
Mar 18, 2026
Mar 18, 2026
6.9 MEDIUM
CVE-2026-27980 — Next.js: Unbounded next/image disk cache growth can exhaust storage

Next.js is a React framework for building full-stack web applications. Starting in version 10.0.0 and prior to version 16.1.7, the default Next.js image optimization disk cache (`/_next/image`) did n…

next.js | Remote | Denial of Service
Mar 18, 2026 Mar 18, 2026
Mar 18, 2026
Mar 18, 2026
6.9 MEDIUM
CVE-2026-27979 — Next.js: Unbounded postponed resume buffering can lead to DoS

Next.js is a React framework for building full-stack web applications. Starting in version 16.0.1 and prior to version 16.1.7, a request containing the `next-resume: 1` header (corresponding with a P…

next.js | Remote | Denial of Service
Mar 18, 2026 Mar 18, 2026
Mar 18, 2026
Mar 18, 2026
5.1 MEDIUM
CVE-2026-4355 — Portabilis i-Educar Endpoint educar_servidor_curso_lst.php cross site scripting

A vulnerability was detected in Portabilis i-Educar 2.11. This impacts an unknown function of the file /intranet/educar_servidor_curso_lst.php of the component Endpoint. Performing a manipulation of …

i-educar | Remote | Cross-Site Scripting
Mar 18, 2026 Mar 18, 2026
Mar 18, 2026
Mar 18, 2026
5.1 MEDIUM
CVE-2026-4354 — TRENDnet TEW-824DRU Web apply_sec.cgi sub_420A78 cross site scripting

A vulnerability was identified in TRENDnet TEW-824DRU 1.010B01/1.04B01. The impacted element is the function sub_420A78 of the file apply_sec.cgi of the component Web Interface. Such manipulation of …

tew-824dru_firmware | Remote | Cross-Site Scripting
Mar 18, 2026 Mar 18, 2026
Mar 18, 2026
Mar 18, 2026
5.3 MEDIUM
CVE-2026-27978 — Next.js: null origin can bypass Server Actions CSRF checks

Next.js is a React framework for building full-stack web applications. Starting in version 16.0.1 and prior to version 16.1.7, `origin: null` was treated as a "missing" origin during Server Action CS…

next.js | Remote | Cross-Site Request Forgery
Mar 18, 2026 Mar 18, 2026
Mar 18, 2026
Mar 18, 2026
2.3 LOW
CVE-2026-27977 — Next.js: null origin can bypass dev HMR websocket CSRF checks

Next.js is a React framework for building full-stack web applications. Starting in version 16.0.1 and prior to version 16.1.7, in `next dev`, cross-site protection for internal websocket endpoints co…

next.js | Remote | Misconfiguration
Mar 18, 2026 Mar 18, 2026
Mar 18, 2026
Mar 18, 2026
4.3 MEDIUM
CVE-2026-27895 — LAM has incorrect regular expression in PDF export component that allows user to upload f…

LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. Prior to version 9.5, the PDF export component does not correctly val…

ldap_account_manager | Remote | Misconfiguration
Mar 18, 2026 Mar 18, 2026
Mar 18, 2026
Mar 18, 2026
8.8 HIGH
CVE-2026-27894 — LAM has Authenticated Local File Inclusion (LFI) in PDF export

LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. Prior to version 9.5, a local file inclusion was detected in the PDF …

ldap_account_manager | Remote | Path Traversal
Mar 18, 2026 Mar 18, 2026
Mar 18, 2026
Mar 18, 2026
8.8 HIGH
CVE-2026-27811 — Roxy-WI has a Command Injection via diff parameter in config comparison allows authentica…

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.3, a command injection vulnerability exists in the `/config/compare/<service>/<server_ip>…

roxy-wi | Remote | Injection
Mar 18, 2026 Mar 18, 2026
Mar 18, 2026
Mar 18, 2026
7.2 HIGH
CVE-2026-27459 — pyOpenSSL DTLS cookie callback buffer overflow

pyOpenSSL is a Python wrapper around the OpenSSL library. Starting in version 22.0.0 and prior to version 26.0.0, if a user provided callback to `set_cookie_generate_callback` returned a cookie value…

pyopenssl | Remote | Memory Corruption
Mar 18, 2026 Mar 18, 2026
Mar 18, 2026
Mar 18, 2026
1.7 LOW
CVE-2026-27448 — pyOpenSSL allows TLS connection bypass via unhandled callback exception in set_tlsext_ser…

pyOpenSSL is a Python wrapper around the OpenSSL library. Starting in version 0.14.0 and prior to version 26.0.0, if a user provided callback to `set_tlsext_servername_callback` raised an unhandled e…

pyopenssl | Remote | Authentication
Mar 18, 2026 Mar 18, 2026
Mar 18, 2026
Mar 18, 2026
5.7 MEDIUM
CVE-2026-26004 — Sentry allows unauthorized access to event data across organizational boundaries

Sentry is a developer-first error tracking and performance monitoring tool. Versions prior to 26.1.0 have a cross-organization Insecure Direct Object Reference (IDOR) vulnerability in Sentry's GroupE…

sentry | Remote | Authorization
Mar 18, 2026 Mar 18, 2026
Mar 18, 2026
Mar 18, 2026
7.1 HIGH
CVE-2026-26001 — GLPI Inventory Plugin has SQL Injection on dropdown_calendar Report

The GLPI Inventory Plugin handles network discovery, inventory, software deployment, and data collection for GLPI agents. Prior to 1.6.6, non sanitized user input can lend to an SQL injection from re…

glpi_inventory | Remote | Injection
Mar 18, 2026 Mar 18, 2026
Mar 18, 2026
Mar 18, 2026
6.5 MEDIUM
CVE-2026-25937 — GLPI has a MFA bypass

GLPI is a free Asset and IT management software package. Starting in version 11.0.0 and prior to version 11.0.6, a malicious actor with knowledge of a user's credentials can bypass MFA and steal thei…

glpi | Remote | Authentication
Mar 18, 2026 Mar 18, 2026
Mar 18, 2026
Mar 18, 2026
5.3 MEDIUM
CVE-2026-3856 — IBM Db2 Recovery Expert Missing Integrity Check

IBM Db2 Recovery Expert for Linux, UNIX and Windows 5.5 IF 2 could allow an attacker to modify or corrupt data due to an insecure mechanism used for verifying the integrity of the data during transmi…

db2_recovery_expert | Remote | Misconfiguration
Mar 17, 2026 Mar 18, 2026
Mar 17, 2026
Mar 18, 2026
7.5 HIGH
CVE-2026-22727 — Cloud Foundry unprotected internal endpoints

Unprotected internal endpoints in Cloud Foundry Capi Release 1.226.0 and below, and CF Deployment v54.9.0 and below on all platforms allows any user who has bypassed the firewall to potentially repla…

| Authorization
Mar 17, 2026 Mar 18, 2026
Mar 17, 2026
Mar 18, 2026
9.8 CRITICAL

Vulnerability in the Oracle Edge Cloud Infrastructure Designer and Visualisation Toolkit product of Oracle Open Source Projects (component: Desktop). The supported version that is affected is 0.3.0…

Mar 17, 2026 Mar 18, 2026
Mar 17, 2026
Mar 18, 2026
5.4 MEDIUM
CVE-2026-20643 — Apple Navigation API Cross-Origin Policy Bypass

A cross-origin issue in the Navigation API was addressed with improved input validation. This issue is fixed in Background Security Improvements for iOS 26.3.1, iPadOS 26.3.1, macOS 26.3.1, and macOS…

macos iphone_os ipados | Remote | Misconfiguration
Mar 17, 2026 Mar 18, 2026
Mar 17, 2026
Mar 18, 2026
7.1 HIGH
CVE-2026-1264 — IBM Sterling B2B Integrator and IBM Sterling File Gateway Improper Access Controls

IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, 6.2.1.0 through 6.2.1.1_1, and 6.2.2.0 allows a remote unauthenticated attacker to view…

sterling_b2b_integrator | Remote | Authorization
Mar 17, 2026 Mar 18, 2026
Mar 17, 2026
Mar 18, 2026
Showing 20 of 5419 Results