ECV 2026 March
ECV 2026 January(17) February(28) March(23) April(29) May(2) June(0) July(0) August(0) September(0) October(0) November(0) December(0)
| 30.3.26 | CVE-2026-3055 | Citrix | NetScaler | Citrix NetScaler Out-of-Bounds Read Vulnerability: Citrix NetScaler ADC (formerly Citrix ADC), NetScaler Gateway (formerly Citrix Gateway) and NetScaler ADC FIPS and NDcPP contain an out-of-bounds reads vulnerability when configured as a SAML IDP leading to memory overread. | CWE-125 |
| 27.3.26 | CVE-2025-53521 | F5 | BIG-IP | F5 BIG-IP Unspecified Vulnerability: F5 BIG-IP AMP contains an unspecified vulnerability that could allow a threat actor to achieve remote code execution. | |
| 26.3.26 | CVE-2026-33634 | Aquasecurity | Trivy | Aquasecurity Trivy Embedded Malicious Code Vulnerability: Aquasecurity Trivy contains an embedded malicious code vulnerability that could allow an attacker to gain access to everything in the CI/CD environment, including all tokens, SSH keys, cloud credentials, database passwords, and any sensitive configuration in memory. | CWE-506 |
| 25.3.26 | CVE-2026-33017 | Langflow | Langflow | Langflow Code Injection Vulnerability: Langflow contains a code injection vulnerability that could allow building public flows without requiring authentication. | |
| 20.3.26 | CVE-2025-54068 | Laravel | Livewire | Laravel Livewire Code Injection Vulnerability: Laravel Livewire contain a code injection vulnerability that could allow unauthenticated attackers to achieve remote command execution in specific scenarios. | CWE-94 |
| 20.3.26 | CVE-2025-32432 | Craft CMS | Craft CMS | Craft CMS Code Injection Vulnerability: Craft CMS contains a code injection vulnerability that allows a remote attacker to execute arbitrary code. | CWE-94 |
| 19.3.26 | CVE-2026-20131 | Cisco | Secure Firewall Management Center (FMC) | Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability: Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management contain a deserialization of untrusted data vulnerability in the web-based management interface that could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device. | CWE-502 |
| 18.3.26 | CVE-2026-20963 | Microsoft | SharePoint | Microsoft SharePoint Deserialization of Untrusted Data Vulnerability: Microsoft SharePoint contains a deserialization of untrusted data vulnerability that allows an unauthorized attacker to execute code over a network. | CWE-502 |
| 18.3.26 | CVE-2025-66376 | Synacor | Zimbra Collaboration Suite (ZCS) | Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability: Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability in the Classic UI where attackers could abuse Cascading Style Sheets (CSS) @import directives in email HTML. | CWE-79 |
| 16.3.26 | CVE-2025-47813 | Wing FTP Server | Wing FTP Server | Wing FTP Server Information Disclosure Vulnerability: Wing FTP Server contains a generation of error message containing sensitive information vulnerability when using a long value in the UID cookie. | CWE-209 |
| 13.3.26 | CVE-2026-3909 | Google | Skia | Google Skia Out-of-Bounds Write Vulnerability: Google Skia contains an out-of-bounds write vulnerability that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products. | CWE-787 |
| 13.3.26 | CVE-2026-3910 | Google | Chromium V8 | Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability: Google Chromium V8 contains an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. | CWE-119 |
| 11.3.26 | CVE-2025-68613 | n8n | n8n | n8n Improper Control of Dynamically-Managed Code Resources Vulnerability: n8n contains an improper control of dynamically managed code resources vulnerability in its workflow expression evaluation system that allows for remote code execution. | CWE-913 |
| 9.3.26 | CVE-2026-1603 | Ivanti | Endpoint Manager (EPM) | Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability: Ivanti Endpoint Manager (EPM) contains an authentication bypass using an alternate path or channel vulnerability that could allow a remote unauthenticated attacker to leak specific stored credential data. | CWE-288 |
| 9.3.26 | CVE-2025-26399 | SolarWinds | Web Help Desk | SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability: SolarWinds Web Help Desk contain a deserialization of untrusted data vulnerability in AjaxProxy that could allow an attacker to run commands on the host machine. | CWE-502 |
| 9.3.26 | CVE-2021-22054 | Omnissa | Workspace One UEM | Omnissa Workspace ONE Server-Side Request Forgery: Omnissa Workspace One UEM formerly known as VMware Workspace One UEM contains a server-side request forgery (SSRF) vulnerability that could allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information. | CWE-918 |
| 5.3.26 | CVE-2023-41974 | Apple | iOS and iPadOS | Apple iOS and iPadOS Use-After-Free Vulnerability: Apple iOS and iPadOS contain a use-after-free vulnerability. An app may be able to execute arbitrary code with kernel privileges. | CWE-416 |
| 5.3.26 | CVE-2021-30952 | Apple | Multiple Products | Apple Multiple Products Integer Overflow or Wraparound Vulnerability: Apple tvOS, macOS, Safari, iPadOS and watchOS contain an integer overflow or wraparound vulnerability due to the processing of maliciously crafted web content that may lead to arbitrary code execution. | CWE-190 |
| 5.3.26 | CVE-2023-43000 | Apple | Multiple Products | Apple Multiple products Use-After-Free Vulnerability: Apple macOS, iOS, iPadOS, and Safari 16.6 contain a use-after-free vulnerability due to the processing of maliciously crafted web content that may lead to memory corruption. | CWE-416 |
| 5.3.26 | CVE-2021-22681 | Rockwell | Multiple Products | Rockwell Multiple Products Insufficient Protected Credentials Vulnerability: Multiple Rockwell products contain an insufficient protected credentials vulnerability. Studio 5000 Logix Designer software may allow a key to be discovered. This key is used to verify Logix controllers are communicating with Rockwell Automation design software. If successfully exploited, this vulnerability could allow an unauthorized application to connect with Logix controllers. To leverage this vulnerability, an unauthorized user would require network access to the controller. | CWE-522 |
| 5.3.26 | CVE-2017-7921 | Hikvision | Multiple Products | Hikvision Multiple Products Improper Authentication Vulnerability: Multiple Hikvision products contain an improper authentication vulnerability that could allow a malicious user to escalate privileges on the system and gain access to sensitive information. | CWE-287 |
| 3.3.26 | CVE-2026-21385 | Qualcomm | Multiple Chipsets | Qualcomm Multiple Chipsets Memory Corruption Vulnerability: Multiple Qualcomm chipsets contain a memory corruption vulnerability while using alignments for memory allocation. | CWE-190 |
| 3.3.26 | CVE-2026-22719 | Broadcom | VMware Aria Operations | Broadcom VMware Aria Operations Command Injection Vulnerability: Broadcom VMware Aria Operations formerly known as vRealize Operations (vROps) contains a command injection vulnerability that allows an unauthenticated attacker to execute arbitrary commands, potentially leading to remote code execution during support‑assisted product migration. | CWE-77 |