Skip to content
Threat Feed

March 2026 (30)

critical advisory

Out-of-bounds Read Vulnerability in fabiangreffrath woof (CVE-2026-4750)

CVE-2026-4750 is a critical out-of-bounds read vulnerability affecting fabiangreffrath woof versions before 15.3.0, potentially leading to information disclosure or denial of service.

cve-2026-4750 out-of-bounds read webserver woof
2r 1t
critical advisory

RetroDebugger Out-of-Bounds Read Vulnerability (CVE-2026-4753)

RetroDebugger before v0.64.72 is vulnerable to an out-of-bounds read (CVE-2026-4753), potentially leading to information disclosure or denial of service.

cve-2026-4753 out-of-bounds read retrodebugger
2r 2t
critical advisory

Android-ImageMagick7 Out-of-Bounds Write Vulnerability (CVE-2026-33854)

An unauthenticated, remote attacker can exploit an out-of-bounds write vulnerability (CVE-2026-33854) in MolotovCherry Android-ImageMagick7 versions before 7.1.2-10 by enticing a user to open a malicious image, potentially leading to arbitrary code execution.

cve out-of-bounds write android imagemagick
2r 1t
high advisory

doslib Memory Buffer Overflow Vulnerability (CVE-2026-33851)

An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in joncampbell123's doslib before version doslib-20250729, potentially leading to arbitrary code execution.

cve-2026-33851 buffer-overflow doslib
2r 3t
high advisory

Out-of-bounds Write Vulnerability in DualSenseY-v2

CVE-2026-33850 is an out-of-bounds write vulnerability in WujekFoliarz DualSenseY-v2 before version 54, potentially allowing an attacker to execute arbitrary code or cause a denial-of-service by writing data outside the allocated buffer.

cve vulnerability oob-write dualsensey-v2
2r 3t
high advisory

linkingvision rapidvms Improper Memory Buffer Restriction Vulnerability (CVE-2026-33847)

An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in linkingvision rapidvms before PR#96 could lead to arbitrary code execution.

cve buffer-overflow rapidvms
2r 2t
high advisory

Galaxy Software Services Vitals ESP Missing Authentication Vulnerability (CVE-2026-4640)

Vitals ESP developed by Galaxy Software Services suffers from a missing authentication vulnerability (CVE-2026-4640), enabling unauthenticated remote attackers to execute functions and obtain sensitive information.

cve-2026-4640 missing-authentication vitals-esp
2r 1t
high advisory

Vitals ESP Incorrect Authorization Vulnerability (CVE-2026-4639)

CVE-2026-4639 is an Incorrect Authorization vulnerability in Galaxy Software Services' Vitals ESP, allowing authenticated remote attackers to perform administrative functions and escalate privileges.

incorrect-authorization privilege-escalation web-application
2r 1t
high advisory

D-Link DIR-825/825R OS Command Injection Vulnerability (CVE-2026-4627)

CVE-2026-4627 is an OS command injection vulnerability in the handler_update_system_time function of the libdeuteron_modules.so file in the NTP Service component of D-Link DIR-825 and DIR-825R devices, which can be exploited remotely by authenticated attackers.

command-injection router legacy-device
2r 2t
high advisory

SQL Injection Vulnerability in itsourcecode Online Enrollment System 1.0 (CVE-2026-4632)

CVE-2026-4632 is a SQL Injection vulnerability in itsourcecode Online Enrollment System 1.0, specifically affecting the Parameter Handler component at '/sms/user/index.php?view=add', allowing a remote attacker to inject malicious SQL code by manipulating the 'Name' argument, with a public exploit available.

sql-injection web-application cve-2026-4632
2r 1t
high advisory

SourceCodester Online Admission System 1.0 SQL Injection Vulnerability

A SQL injection vulnerability in SourceCodester Online Admission System 1.0 allows remote attackers to execute arbitrary SQL commands by manipulating the 'program' argument in the /programmes.php file.

sql-injection web-application vulnerability
2r 1t 1i
high advisory

DefaultFuction Jeson-Customer-Relationship-Management-System Server-Side Request Forgery Vulnerability

A server-side request forgery (SSRF) vulnerability exists in the DefaultFuction Jeson-Customer-Relationship-Management-System's API Module, specifically affecting the /api/System.php file, allowing remote attackers to manipulate the 'url' argument and potentially access internal resources.

ssrf cve-2026-4623 jeson-crm webserver
2r 10t
critical advisory

Google Chrome FedCM Use-After-Free Vulnerability (CVE-2026-4680)

A use-after-free vulnerability in Google Chrome's FedCM component (CVE-2026-4680) allows a remote attacker to execute arbitrary code within a sandbox by exploiting a crafted HTML page.

CVE-2026-4680 use-after-free chrome fedcm
2r 1t
high advisory

Google Chrome Font Integer Overflow Vulnerability (CVE-2026-4679)

A remote attacker can perform an out-of-bounds memory write on Google Chrome by exploiting an integer overflow in the Fonts component via a crafted HTML page in versions prior to 146.0.7680.165.

cve-2026-4679 chrome integer-overflow memory-corruption
2r 3t
high advisory

Google Chrome Use-After-Free Vulnerability (CVE-2026-4676)

A use-after-free vulnerability (CVE-2026-4676) in Google Chrome before 146.0.7680.165 allows a remote attacker to potentially perform a sandbox escape via a crafted HTML page.

use-after-free sandbox-escape chrome cve-2026-4676
2r 1t
high advisory

Google Chrome WebAudio Out-of-Bounds Read Vulnerability (CVE-2026-4677)

A remote attacker can trigger an out-of-bounds memory read in Google Chrome's WebAudio implementation by crafting a malicious HTML page (CVE-2026-4677), affecting versions prior to 146.0.7680.165.

cve-2026-4677 chrome webaudio out-of-bounds read
2r 1t
high advisory

Google Chrome WebGPU Use-After-Free Vulnerability (CVE-2026-4678)

A use-after-free vulnerability in Google Chrome's WebGPU component (CVE-2026-4678) allows a remote attacker to execute arbitrary code within a sandbox by crafting a malicious HTML page, affecting Chrome versions prior to 146.0.7680.165.

cve-2026-4678 use-after-free chrome webgpu
2r 1t
high advisory

Google Chrome Out-of-Bounds Read Vulnerability (CVE-2026-4674)

A remote attacker can exploit an out-of-bounds read vulnerability (CVE-2026-4674) in Google Chrome versions prior to 146.0.7680.165 to achieve out-of-bounds memory access via a crafted HTML page, impacting confidentiality, integrity, and availability.

cve out-of-bounds read chrome
2r 1t
high advisory

Spring Cloud Config Server Path Traversal Vulnerability (CVE-2026-22739)

A path traversal vulnerability exists in Spring Cloud Config Server versions 3.1.x before 3.1.13, 4.1.x before 4.1.9, 4.2.x before 4.2.3, 4.3.x before 4.3.2, and 5.0.x before 5.0.2, allowing unauthenticated remote attackers to access files outside configured search directories when using the native file system backend.

cve-2026-22739 path-traversal spring-cloud
2r 1t
critical advisory

Contest Gallery WordPress Plugin Authentication Bypass Vulnerability (CVE-2026-4021)

CVE-2026-4021 describes an authentication bypass vulnerability in the Contest Gallery plugin for WordPress, allowing unauthenticated attackers to gain admin access by manipulating the user activation key and using an AJAX login endpoint.

wordpress authentication-bypass plugin-vulnerability cve-2026-4021
2r 3t
high advisory

SourceCodester E-Commerce Site SQL Injection Vulnerability (CVE-2026-4613)

A remote SQL injection vulnerability (CVE-2026-4613) exists in SourceCodester E-Commerce Site 1.0 within the /products.php file due to improper input sanitization of the 'Search' argument, potentially allowing attackers to read or modify sensitive database information.

sql-injection web-application ecommerce cve-2026-4613
2r 1t
high advisory

Go MCP SDK Vulnerable to Cross-Site POST Requests (CVE-2026-33252)

The Go MCP SDK before v1.4.1 is vulnerable to cross-site POST requests due to insufficient origin validation and content type enforcement, potentially leading to arbitrary tool execution on local servers in stateless or sessionless deployments.

cve-2026-33252 cross-site request forgery go-mcp-sdk
1r 1t
high advisory

Salvo Web Framework Path Traversal Vulnerability

Salvo web framework versions 0.39.0 through 0.89.2 are vulnerable to Path Traversal and Access Control Bypass, allowing unauthenticated external attackers to bypass proxy routing constraints and access unintended backend paths.

path-traversal access-control-bypass web-framework
2r 1t
critical advisory

Tekton Pipelines Git Resolver Path Traversal Vulnerability

The Tekton Pipelines git resolver is vulnerable to path traversal via the `pathInRepo` parameter, allowing arbitrary file reads from the resolver pod's filesystem, including ServiceAccount tokens.

tekton path-traversal kubernetes cve-2026-33211 cloud
2r 1t
medium advisory

Ruby on Rails Active Storage DoS Vulnerability (CVE-2026-33174)

A denial-of-service vulnerability (CVE-2026-33174) exists in Ruby on Rails Active Storage versions prior to 8.1.2.1, 8.0.4.1, and 7.2.3.1 due to unbounded memory allocation when handling large or unbounded Range headers in proxy delivery mode.

rails active-storage dos cve-2026-33174
2r 1t
critical advisory

Blinko Privilege Escalation via upsertUser Endpoint

An authenticated user can exploit the Blinko upsertUser endpoint to escalate privileges, modify other users' passwords, and achieve account takeover due to missing authentication and verification checks.

privilege-escalation cve-2026-23480 blinko
2r 1t
high advisory

Connect-CMS Cabinet Plugin DOM-based XSS Vulnerability

A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the Cabinet Plugin list view of Connect-CMS, affecting versions 1.35.0 to 1.41.0 and 2.35.0 to 2.41.0, which can lead to arbitrary script execution in the victim's browser.

xss connect-cms cabinet-plugin
2r 1t
high threat

TeamPCP Compromise of KICS GitHub Action Supply Chain

TeamPCP conducted a supply chain attack compromising the KICS GitHub Action, impacting users who integrated the compromised version into their CI/CD pipelines.

TeamPCP supply-chain github-actions ci/cd
2r 4t
critical advisory

WWBN AVideo SQL Injection Vulnerability (CVE-2026-33723)

WWBN AVideo platform versions up to 26.0 are vulnerable to SQL injection (CVE-2026-33723), allowing authenticated attackers to inject arbitrary SQL commands via the 'user_id' POST parameter and extract sensitive data such as password hashes, API keys, and encryption salts.

avideo sqli cve-2026-33723 web-application
2r 1t
high advisory

WWBN AVideo Privilege Escalation via Moderator Account

WWBN AVideo platform versions up to 26.0 allows a 'Videos Moderator' to escalate privileges and perform unauthorized video management operations due to inconsistent authorization checks.

avideo privilege-escalation web-application
2r 1t