5.3

CVSS3.1

CVE-2026-32881 - ewe has an Overly Permissive List of Allowed Inputs

ewe is a Gleam web server. ewe is a Gleam web server. Versions 0.6.0 through 3.0.4 are vulnerable to authentication bypass or spoofed proxy-trust headers. Chunked transfer encoding trailer handling merges declared trailer fields into req.headers after body parsing, but the denylist only blocks 9 heโ€ฆ

๐Ÿ“… Published: March 20, 2026, 1:18 a.m. ๐Ÿ”„ Last Modified: March 25, 2026, 2:10 p.m.

7.5

CVSS3.1

CVE-2026-32873 - ewe: Loop with Unreachable Exit Condition ('Infinite Loop')

ewe is a Gleam web server. Versions 0.8.0 through 3.0.4 contain a bug in the handle_trailers function where rejected trailer headers (forbidden or undeclared) cause an infinite loop. When handle_trailers encounters such a trailer, three code paths (lines 520, 523, 526) recurse with the original bufโ€ฆ

๐Ÿ“… Published: March 20, 2026, 1:13 a.m. ๐Ÿ”„ Last Modified: April 17, 2026, 11:30 a.m.

6.4

CVSS3.1

CVE-2026-32880 - ChurchCRM is vulnerable to Stored XSS through JSON handling in SystemSettings.php

ChurchCRM is an open-source church management system. Versions prior to 7.0.2 allow an admin user to edit JSON type system settings to store a JavaScript payload that can execute when any admin views the system settings. The JSON input is left unescaped/unsanitized in SystemSettings.php, leading toโ€ฆ

๐Ÿ“… Published: March 20, 2026, 1:04 a.m. ๐Ÿ”„ Last Modified: March 25, 2026, 2:10 p.m.

5.1

CVSS4.0

CVE-2026-32828 - Kargo: SSRF in Promotion http/http-download Steps Enables Internal Network Access and Data Exfiltraโ€ฆ

Kargo manages and automates the promotion of software artifacts. In versions 1.4.0 through 1.6.3, 1.7.0-rc.1 through 1.7.8, 1.8.0-rc.1 through 1.8.11, and 1.9.0-rc.1 through 1.9.4, the http and http-download promotion steps allow Server-Side Request Forgery (SSRF) against link-local addresses, mostโ€ฆ

๐Ÿ“… Published: March 20, 2026, 12:39 a.m. ๐Ÿ”„ Last Modified: March 30, 2026, 8:59 p.m.

8.8

CVSS4.0

CVE-2026-32771 - Monitoring is vulnerable to Archive Slip due to missing checks in sanitization

The CTFer.io Monitoring component is in charge of the collection, process and storage of various signals (i.e. logs, metrics and distributed traces). In versions prior to 0.2.2, the sanitizeArchivePath function in pkg/extract/extract.go (lines 248โ€“254) is vulnerable to Path Traversal due to a missiโ€ฆ

๐Ÿ“… Published: March 20, 2026, 12:29 a.m. ๐Ÿ”„ Last Modified: April 16, 2026, 1:28 p.m.

7.1

CVSS4.0

CVE-2026-32769 - Fullchain's Invalid NetworkPolicy enables a malicious actor to pivot into another namespace

Fullchain is an umbrella project for deploying a ready-to-use CTF platform. In versions prior to 0.1.1, due to a mis-written NetworkPolicy, a malicious actor can pivot from a subverted application to any Pod out of the origin namespace. The flawed inter-ns NetworkPolicy breaks the security-by-defaโ€ฆ

๐Ÿ“… Published: March 20, 2026, 12:18 a.m. ๐Ÿ”„ Last Modified: April 18, 2026, 9:45 a.m.

9.8

CVSS3.1

CVE-2026-32767 - SiYuan: Authorization Bypass Allows Arbitrary SQL Execution via Search API

SiYuan is a personal knowledge management system. Versions 3.6.0 and below contain an authorization bypass vulnerability in the /api/search/fullTextSearchBlock endpoint. When the method parameter is set to 2, the endpoint passes user-supplied input directly as a raw SQL statement to the underlying โ€ฆ

๐Ÿ“… Published: March 20, 2026, 12:13 a.m. ๐Ÿ”„ Last Modified: March 25, 2026, 2:10 p.m.

1.7

CVSS4.0

CVE-2026-32766 - astral-tokio-tar insufficiently validates PAX extensions during extraction

astral-tokio-tar is a tar archive reading/writing library for async Rust. In versions 0.5.6 and earlier, malformed PAX extensions were silently skipped when parsing tar archives. This silent skipping (rather than rejection) of invalid PAX extensions could be used as a building block for a parser diโ€ฆ

๐Ÿ“… Published: March 20, 2026, 12:07 a.m. ๐Ÿ”„ Last Modified: April 17, 2026, 9:09 p.m.

9.3

CVSS4.0

CVE-2026-32985 - Xerte Online Toolkits <= 3.14 Unauthenticated Template Import Arbitrary File Upload Leading to Remoโ€ฆ

Xerte Online Toolkits versions 3.14 and earlier contain an unauthenticated arbitrary file upload vulnerability in the template import functionality that allows remote attackers to execute arbitrary code by uploading a crafted ZIP archive containing malicious PHP payloads. Attackers can bypass autheโ€ฆ

๐Ÿ“… Published: March 20, 2026, 12:06 a.m. ๐Ÿ”„ Last Modified: April 16, 2026, 1:42 p.m.

7.8

CVSS3.1

CVE-2025-63261 -

AWStats 8.0 is vulnerable to Command Injection via the open function

๐Ÿ“… Published: March 20, 2026, midnight ๐Ÿ”„ Last Modified: April 8, 2026, 8:01 p.m.
Total resulsts: 348552
Page 966 of 34,856
ยซ previous page ยป next page
Filters