Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 24 March 2026

RSS

48 vulnerabilities published on 24 March 2026

Severity:
Go SDK HTTP Server Allows Arbitrary Post Requests Without Authentication
GHSA-89xv-2j6f-qhc8 CVE-2026-33252 GO-2026-4773
A security issue was found in a Go library that helps with HTTP communication. If not properly configured, an attacker could send unauthorized requests to a server, potentially triggering unwanted act...
7.1
Apache HTTPD with Mod_gnutls: Client Certificate Access Risk
CVE-2026-33308
A security issue in older versions of Apache HTTPD's Mod_gnutls module allowed attackers to use a valid client certificate for the wrong purpose. This has been fixed in version 0.13.0. If you're using...
6.8
LearnDash LMS plugin for WordPress allows unauthorized data access
CVE-2026-3079
An attacker with Contributor-level access and above can access sensitive information in the LearnDash LMS plugin for WordPress. This happens when they use a specific parameter in a special request. To...
6.5
Ella Core Crashes on Malformed NAS Messages
GHSA-3366-gw57-fcm5 CVE-2026-33283 GO-2026-4776
Ella Core is vulnerable to a crash when receiving specially crafted NAS messages. This can cause service disruption for all connected subscribers. To fix, software updates that add a security check fo...
6.5
Ella Core Crashes on Invalid NGAP Message IDs
GHSA-q669-4gmv-g8mf CVE-2026-33281 GO-2026-4783
Ella Core may crash if it receives a specially crafted NGAP message with an invalid PDU Session ID. This could cause a service disruption for connected subscribers. To protect against this, update Ell...
6.5
itsourcecode sanitize or validate this input 1.0: Unsanitized Input Leads to SQL Injection
CVE-2026-4614
The itsourcecode software has a weakness in how it handles input from users. This makes it possible for hackers to inject malicious code into the system, potentially allowing them to access sensitive ...
5.3
Dasel's YAML Parser Crashes System with Huge Input
GHSA-4fcp-jxh7-23x8 GO-2026-4768 CVE-2026-33320
Dasel's YAML parser can be exploited with an overly large YAML file, causing it to consume all available CPU and memory, freezing or crashing the system. This is due to a flaw in the way the parser ha...
6.2
WordPress User Registration & Membership Plugin Allows Unauthorized Access to Data
CVE-2026-4056
The User Registration & Membership plugin for WordPress has a security flaw that lets attackers with some access levels modify site rules, potentially exposing sensitive content or blocking legitimate...
5.4
JRuby Bcrypt Hashes Weakened by Integer Overflow
GHSA-f27w-vcwj-c954 CVE-2026-33306
A bug in the JRuby bcrypt implementation can make password hashes much weaker when using the cost setting of 31, allowing attackers to easily guess passwords. Affected applications should update to th...
4.5
WPGraphQL allows non-moderators to approve their own comments
CVE-2026-33290
A security update is available for WPGraphQL versions prior to 2.10.0. An authenticated user with limited privileges can approve their own comments, bypassing moderation workflows. Update to version 2...
4.3
Bolo-Blog 2.6.4: Remote Code Execution via Article Title
CVE-2026-4616
A security flaw in Bolo-Blog 2.6.4 allows hackers to inject malicious code into the system by manipulating article titles. This could let them access sensitive data or take control of your site. Updat...
4.8
MINI-xm6h-q9vq-hvvv
MINI-xm6h-q9vq-hvvv
MINI-x62j-p2fx-fqx7
MINI-x62j-p2fx-fqx7
MINI-g3xw-28qh-2893
MINI-g3xw-28qh-2893
MINI-937j-hj6f-6vw6
MINI-937j-hj6f-6vw6
MINI-8mpx-v233-4qcc
MINI-8mpx-v233-4qcc
WordPress Plugin 'WP GDPR Compliance' Allows Unauthorized Data Access
MINI-cx2q-4mh3-g5rf
A security issue exists in the WP GDPR Compliance plugin for WordPress. This could allow an attacker to view sensitive user data without permission. Affected sites should update to the latest version ...
Microsoft Windows L1TP Listener Service Remote Code Execution
MINI-4c62-qww7-2ppg
The L1TP Listener Service on Windows systems has a remote code execution vulnerability. This means that an attacker could potentially run malicious code on a vulnerable system without needing a passwo...
Adobe Reader for Android allows attackers to execute arbitrary code
MINI-j47v-jfmf-phm2
Adobe Reader for Android has a weakness that allows hackers to run unauthorized code on your device. If exploited, this could lead to unauthorized access to your personal data, including sensitive inf...
MINI-mx23-3v5j-g7fg
MINI-mx23-3v5j-g7fg
MINI-wm9r-vw3w-9w4j
MINI-wm9r-vw3w-9w4j
MINI-35jh-3369-c82r
MINI-35jh-3369-c82r
MINI-4rc5-jq6p-7338
MINI-4rc5-jq6p-7338