Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 16 March 2026
RSS175 vulnerabilities published on 16 March 2026
Severity:
Tenda AC8 16.03.50.11: Remote Authentication Bypass via IP Address
CVE-2026-4252
The Tenda AC8 router's IPv6 authentication can be bypassed remotely, allowing unauthorized access. This is a serious security risk because it lets attackers gain access to the router and potentially t...
8.9
WordPress Plugin Allows Attackers to Manipulate Database Queries
CVE-2025-62319
An attacker can inject malicious code into a WordPress plugin's database queries, potentially allowing them to access sensitive information. This is a type of cyber attack that can happen if an attack...
9.8
Parse Server: Hackers can take over any user account
GHSA-5fw2-8jcv-xh87
CVE-2026-32248
BIT-parse-2026-32248
Parse Server's default setting for anonymous user sign-ups leaves accounts open to takeover by hackers. This can happen if the server is not configured to check user names properly. To fix this, updat...
9.1
pyOpenSSL DTLS Cookie Overflow Risk: Large Cookie Values Crash Application
GHSA-5pwr-322w-8jr4
CVE-2026-27459
A bug in pyOpenSSL could cause a crash if a server is given a very long cookie value. This has been fixed by pyOpenSSL's developers, so you should update to the latest version to stay safe.
9.4
Glances Browser API Leaks Downstream Server Credentials
GHSA-r297-p3v4-wp8m
CVE-2026-32633
An unauthenticated Glances Browser API can expose server credentials to unauthorized users. This occurs when the Glances Browser/API instance is started without a password, allowing anyone with networ...
9.1
Authlib JWS Forgery: Attackers Can Bypass Authentication
GHSA-wvwj-cvrp-7pv5
CVE-2026-27962
A security flaw in Authlib's JWS (JSON Web Signature) feature allows attackers to create fake tokens that can trick servers into accepting them as genuine. This bypasses authentication and authorizati...
9.1
Spinnaker clouddriver and orca allow malicious URLs with underscores
GHSA-8r8j-gfhg-fw38
CVE-2026-25534
Malicious URLs with underscores can bypass security checks in Spinnaker's clouddriver and orca components, allowing potential security breaches. This issue has been fixed in recent updates, and users ...
9.1
ONNX Model Downloads Can Be Hacked Without Warning
GHSA-hqmj-h5c6-369m
CVE-2026-28500
A security flaw in ONNX allows hackers to trick users into downloading and running malicious models from untrusted sources without any warnings. This can lead to sensitive information being stolen fro...
8.6
Glances REST API exposed without password
GHSA-wvxv-4j8q-4wjq
CVE-2026-32596
Glances web server exposes sensitive system information, including passwords, API keys, and tokens, to any network client without a password. This can happen if you run Glances with the `-w` option wi...
8.3
Authlib Exposes Sensitive Data via Cryptographic Padding Oracle
GHSA-7432-952r-cw78
CVE-2026-28490
The Authlib library in certain configurations allows attackers to determine the validity of JSON Web Encryption (JWE) padding, potentially exposing sensitive data. This issue is present in any Authlib...
8.3
Glances Central Browser Leaks Credentials to Fake Servers on Local Network
GHSA-vx5f-957p-qpvm
CVE-2026-32634
Glances, a server monitoring tool, has a security issue that allows an attacker on the same local network to steal login credentials. This happens when an attacker tricks the tool into thinking a fake...
8.1
Glances API Exposes Monitoring Data to Any Website
GHSA-9jfm-9rc6-2hfq
CVE-2026-32610
Glances's default settings allow any website to access sensitive information about your system, such as monitoring data and configuration secrets, if you're using the Glances API. This is a concern be...
8.1
Authlib: Fail-Open Cryptographic Verification in OIDC Hash Binding
GHSA-m344-f55w-2m6j
CVE-2026-28498
## 1. Executive Summary
A critical library-level vulnerability was identified in the **Authlib** Python library concerning the validation of OpenID Connect (OIDC) ID Tokens. Specifically, the interna...
7.8
SOLIDWORKS Desktop: Malicious File Can Execute Code on Your Computer
CVE-2026-3476
A vulnerability in SOLIDWORKS Desktop can allow hackers to run malicious code on your computer if you open a specially crafted file. This could lead to your computer being compromised and your data at...
7.8
IncusOS allows unauthorized access to encrypted data with physical access
GHSA-wj2j-qwcf-cfcc
CVE-2026-32606
IncusOS systems can be compromised if an attacker with physical access to the machine can substitute the root partition with a fake one. This allows the attacker to bypass encryption and access sensit...
7.6
Leanprover Unicode Input Component Allows Malicious Code Execution
GHSA-6ggm-pwr9-r5h2
CVE-2026-32732
Using a vulnerable version of the Leanprover Unicode Input Component can allow attackers to inject malicious code into your website. This can happen if you're using version 0.1.9 or earlier of the com...
7.5
Glances Exposes Password Hash and SNMP Credentials via Insecure API Endpoint
GHSA-cvwp-r2g2-j824
CVE-2026-32609
Glances' API endpoint for displaying command-line arguments exposes sensitive information like password hashes and SNMP credentials when accessed without authentication. This allows unauthorized users...
7.5
LeafKit may display unescaped data, allowing malicious scripts to run
GHSA-6jj5-j4j8-8473
CVE-2026-28499
LeafKit's data display feature can be bypassed, allowing hackers to inject malicious code. This can happen when displaying collections of data. To fix this, update LeafKit to the latest version or app...
7.5
Uncontrolled Memory Allocation in DiceBear Converter
GHSA-v3r3-4qgc-vw66
CVE-2026-29112
The DiceBear Converter, used to generate avatars, can be forced to use up too much memory if it's given an SVG with very large width or height values. This can cause a server to become unresponsive. I...
7.5
FastMCP OAuth Proxy issues tokens for wrong servers
GHSA-5h2m-4q8j-pqpj
CVE-2025-69196
The FastMCP OAuth Proxy incorrectly issues tokens for the wrong server, not the one it's supposed to be protecting. This means an attacker can trick the proxy into issuing tokens for their own server,...
7.4
Parse Server's OAuth2 adapter can validate wrong provider's tokens
GHSA-2cjm-2gwv-m892
CVE-2026-32242
BIT-parse-2026-32242
If you're using multiple OAuth2 providers with Parse Server, a bug can let a token be accepted even if it shouldn't be. This happens because the same instance of the OAuth2 adapter is used for all pro...
8.6
Glances: Unsecured SQL Queries in DuckDB Export
GHSA-49g7-2ww7-3vf5
CVE-2026-32611
Glances has a security risk in its DuckDB export feature, which could allow an attacker to manipulate database queries. This means an attacker might be able to access sensitive data or disrupt the dat...
7.0
Glances allows attackers to inject commands via process names
GHSA-vcv2-q258-wrg7
CVE-2026-32608
Glances has a security issue where attackers can inject malicious commands if they can control a process name or container name. This could allow them to execute arbitrary system commands. To protect ...
7.0
Attackers can read all SiYuan workspace data
GHSA-4j3x-hhg2-fm2x
CVE-2026-32704
A security issue in SiYuan's renderSprig feature allows any logged-in user to access all data in the workspace database, including sensitive information. This is because the feature is missing a cruci...
6.5
Red Hat vsftpd: Remote Code Execution from Unauthenticated Users
RHSA-2026:4554
A security update is available for vsftpd on Red Hat systems. This update addresses a security weakness that could allow an attacker to execute arbitrary commands on a server without permission. Users...
6.5