9.3

CVSS4.0

CVE-2026-32295 - JetKVM insufficient login rate limiting

JetKVM before 0.5.4 does not rate limit login requests, enabling brute-force attempts to guess credentials.

πŸ“… Published: March 17, 2026, 5:19 p.m. πŸ”„ Last Modified: March 18, 2026, 2:52 p.m.

7

CVSS4.0

CVE-2026-32294 - JetKVM insufficient firmware verification

JetKVM prior to 0.5.4 does not verify the authenticity of downloaded firmware files. An attacker-in-the-middle or a compromised update server could modify the firmware and the corresponding SHA256 hash to pass verification.

πŸ“… Published: March 17, 2026, 5:19 p.m. πŸ”„ Last Modified: March 18, 2026, 2:52 p.m.

6.3

CVSS4.0

CVE-2026-32293 - GL-iNet Comet (GL-RM1) KVM insufficient certificate validation

The GL-iNet Comet (GL-RM1) KVM connects to a GL-iNet site during boot-up to provision client and CA certificates. The GL-RM1 does not verify certificates used for this connection, allowing an attacker-in-the-middle to serve invalid client and CA certificates. The GL-RM1 will attempt to use the inva…

πŸ“… Published: March 17, 2026, 5:19 p.m. πŸ”„ Last Modified: March 18, 2026, 2:52 p.m.

9.3

CVSS4.0

CVE-2026-32292 - GL-iNet Comet (GL-RM1) KVM insufficient login rate-limiting

The GL-iNet Comet (GL-RM1) KVM web interface does not limit login requests, enabling brute-force attempts to guess credentials.

πŸ“… Published: March 17, 2026, 5:18 p.m. πŸ”„ Last Modified: March 18, 2026, 2:52 p.m.

7

CVSS4.0

CVE-2026-32291 - GL-iNet Comet (GL-RM1) KVM unauthenticated root access via UART serial console

The GL-iNet Comet (GL-RM1) KVM does not require authentication on the UART serial console. This attack requires physically opening the device and connecting to the UART pins.

πŸ“… Published: March 17, 2026, 5:18 p.m. πŸ”„ Last Modified: March 18, 2026, 2:52 p.m.

7

CVSS4.0

CVE-2026-32290 - GL-iNet Comet (GL-RM1) KVM insufficient firmware verification

The GL-iNet Comet (GL-RM1) KVM does not sufficiently verify the authenticity of uploaded firmware files. An attacker-in-the-middle or a compromised update server could modify the firmware and the corresponding MD5 hash to pass verification.

πŸ“… Published: March 17, 2026, 5:18 p.m. πŸ”„ Last Modified: March 18, 2026, 2:52 p.m.

6.9

CVSS4.0

CVE-2026-4319 - code-projects Simple Food Order System add-item.php sql injection

A vulnerability was identified in code-projects Simple Food Order System 1.0. Affected by this vulnerability is an unknown functionality of the file /routers/add-item.php. Such manipulation of the argument price leads to sql injection. The attack can be launched remotely. The exploit is publicly av…

πŸ“… Published: March 17, 2026, 5:02 p.m. πŸ”„ Last Modified: March 18, 2026, 2:52 p.m.

8.7

CVSS4.0

CVE-2026-4148 - ExpressionContext use-after-free in classic engine $lookup and $graphLookup aggregation operators

A use-after-free vulnerability can be triggered in sharded clusters by an authenticated user with the read role who issues a specially crafted $lookup or $graphLookup aggregation pipeline.

πŸ“… Published: March 17, 2026, 3:53 p.m. πŸ”„ Last Modified: March 18, 2026, 2:52 p.m.

7.1

CVSS4.0

CVE-2026-4147 - Stack memory disclosure in filemd5 command

An authenticated user with the read role may read limited amounts of uninitialized stack memory via specially-crafted issuances of the filemd5 command.

πŸ“… Published: March 17, 2026, 3:50 p.m. πŸ”„ Last Modified: March 18, 2026, 2:52 p.m.

4.3

CVSS3.1

CVE-2026-28506 - Outline's Information Disclosure in Activity Logs allows User Enumeration of Private Drafts

Outline is a service that allows for collaborative documentation. Prior to 1.5.0, the events.list API endpoint, used for retrieving activity logs, contains a logic flaw in its filtering mechanism. It allows any authenticated user to retrieve activity events associated with documents that have no co…

πŸ“… Published: March 17, 2026, 3:30 p.m. πŸ”„ Last Modified: March 19, 2026, 7:32 p.m.
Total resulsts: 339290
Page 100 of 33,929
Β« previous page Β» next page
Filters