Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 27 March 2026
RSS35 vulnerabilities published on 27 March 2026
Severity:
Incus Allows Root Access to Arbitrary Files
CVE-2026-33945
Incus virtual machine manager versions prior to 6.23.0 can be tricked into writing files outside of a secure area. This allows an attacker to gain root access and perform malicious actions. Upgrade to...
9.9
Datadog Java Agent: Remote Code Execution via RMI
GHSA-579q-h82j-r5v2
CVE-2026-33728
The Datadog Java Agent, if not updated to version 1.60.3 or later, can allow an attacker to take control of a system if they have network access to a specific port and can find a way to exploit it. Th...
9.3
OpenTelemetry Java: Unrestricted Code Can Run on Your Server
GHSA-xw7x-h9fj-p2c7
CVE-2026-33701
If you use OpenTelemetry Java with a remote management port, a malicious person could potentially take control of your server by sending it a specially crafted message. This only happens if you have a...
9.3
MyTube: Unsecured Passkey Registration Allows Full Admin Access
CVE-2026-33890
If you're using MyTube version 1.8.70 or earlier, an attacker can create a special key that lets them take full control of your MyTube setup without needing a password. This is a big deal because it m...
8.9
Tenda AC5 Router Allows Remote Code Execution via Malformed Network Request
CVE-2026-4906
A security issue in Tenda AC5 routers allows an attacker to execute malicious code on the device by sending a specially crafted network request. This could allow an attacker to take control of the rou...
7.4
Tenda AC5 Router: Unauthorized Access via Malicious Wi-Fi WPS Request
CVE-2026-4905
A security flaw in Tenda AC5 routers allows hackers to potentially take control of the device. This could happen if the user visits a malicious website or opens a phishing email. To stay safe, update ...
7.4
Tenda AC5 Router: Remote Code Execution via Malformed Request
CVE-2026-4904
A security flaw in the Tenda AC5 router allows an attacker to execute malicious code on the device if they send a specially crafted request. This could allow an attacker to take control of the device....
7.4
Incus is a system container and virtual machine manager. Prior to version 6.23.0, the web server spawned by `incus webui` incorrectly validates the authentication token such that an invalid value w...
CVE-2026-33898
Incus is a system container and virtual machine manager. Prior to version 6.23.0, the web server spawned by `incus webui` incorrectly validates the authentication token such that an invalid value will...
8.8
vLLM Enables Remote Code Execution When Disabled
CVE-2026-27893
vLLM versions 0.10.1 to 0.17.9 may allow malicious code to run on your system if you've disabled remote code execution. This is a security risk. Update to v0.18.0 or later to fix the issue.
8.8
Docker BuildKit Malware Can Write Files Outside Designated Area
GHSA-4c29-8rgm-jvjj
CVE-2026-33747
Docker BuildKit's custom frontend can be tricked into saving files in the wrong place, potentially causing data loss. This can happen if you use a custom frontend with Docker. To stay safe, use a know...
8.4
Docker Command Injection in BentoML via bentofile.yaml
GHSA-jfjg-vc52-wqvf
CVE-2026-33744
BentoML's Dockerfile generation in bentofile.yaml allows a malicious user to execute arbitrary system commands when building a container. This can happen if a user includes a malicious string in the s...
7.8
MyTube allows attackers to lock out users with repeated login attempts
CVE-2026-33935
Prior to version 1.8.72, MyTube's login system can be abused by an attacker to lock out all users from logging in for 24 hours. To fix this, update to MyTube version 1.8.72 or later. Regularly updatin...
7.7
OpenHands is software for AI-driven development. Starting in version 1.5.0, a Command Injection vulnerability exists in the `get_git_diff()` method at `openhands/runtime/utils/git_handler.py:134`. ...
GHSA-7h8w-hj9j-8rjw
CVE-2026-33718
OpenHands is software for AI-driven development. Starting in version 1.5.0, a Command Injection vulnerability exists in the `get_git_diff()` method at `openhands/runtime/utils/git_handler.py:134`. The...
7.6
Cocos AI Confidential Computing System Has TLS Key Extraction Flaw
CVE-2026-33697
A security issue affects all versions of Cocos AI from v0.4.0 through v0.8.2. An attacker with access to the server or through certain types of attacks could extract a secret key, allowing them to pre...
7.5
cpp-httplib Exposes Credentials in Redirects
CVE-2026-33745
The cpp-httplib library stores login credentials and sends them to any website it redirects to. This means a malicious site could steal your login information. Update to version 0.39.0 or later to fix...
7.4
MyTube: Unauthorized Access to Configuration Data
CVE-2026-33735
Prior to version 1.8.69, a security weakness in MyTube allows attackers to access sensitive configuration data and potentially take control of the application. This weakness is fixed in version 1.8.69...
7.4
Simple Laundry System 1.0 exposes user data to hackers
CVE-2026-4908
Code-projects Simple Laundry System 1.0 has a security flaw that allows hackers to access user data. This happens when the system processes user input without checking it properly. Users should update...
6.9
Metabase Enterprise: Authenticated Admins Can Execute Malicious Code
CVE-2026-33725
Authenticated admins on Metabase Enterprise can execute malicious code and read sensitive files if they have access to the import feature. This affects all Enterprise versions with serialization enabl...
7.2
Open WebUI: Authenticated User Can Overwrite Any File
CVE-2026-28788
A security issue in Open WebUI allows any authenticated user to modify any file on the platform, potentially allowing an attacker to tamper with the artificial intelligence's responses to other users....
7.1
Open Source Point of Sale application exposes employee password change
CVE-2026-33730
An attacker with limited access can change other employees' passwords, including admin passwords. This is fixed in version 3.4.2. Update to the latest version to protect your system.
6.5
Activitypub-Federation allows attackers to access internal services
GHSA-q537-8fr5-cw35
CVE-2026-33693
An attacker can control a remote domain and access services on the target server by sending traffic to 0.0.0.0. This is due to a missing check in the Activitypub-Federation code. To mitigate this, upd...
6.5
Page-Replica Page Replica allows attackers to pretend to be a trusted website
CVE-2026-4907
An attacker can trick the Page-Replica Page Replica system into thinking it's accessing a trusted site, allowing them to potentially steal sensitive information or perform unauthorized actions. This i...
5.3
OpenFGA data access bypassed by cache misuse
GHSA-h6c8-cww8-35hf
CVE-2026-33729
GO-2026-4857
OpenFGA allows unauthorized access to sensitive data when caching is enabled and certain conditions are met. This could lead to data being exposed that shouldn't be. To fix, update to OpenFGA version ...
5.8
Cilium L7 proxy bypasses Kubernetes NetworkPolicy on same-node traffic
GHSA-hxv8-4j4r-cqgv
CVE-2026-33726
GO-2026-4856
Cilium, a networking tool for Kubernetes, may not enforce network policies for traffic between pods and L7 services on the same node. This can happen in certain Cilium deployments, such as Amazon EKS ...
5.4
Open WebUI: Deleting files without permission
CVE-2026-29070
A security issue in Open WebUI allows users with write access to delete files they shouldn't be able to. This is fixed in version 0.8.6. Users should update to this version to prevent unauthorized fil...
5.4